If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Rate Thread | Display Modes |
#1
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)
On Mon, 26 Feb 2018 14:34:58 -0500, Paul
wrote: If you want to study "what is missing from my system", you'd use MBSA 2.3 for that. It only handles "security" patches, not "Optional" patches. The following is from MSBA 3.2. It claims "No security updates are missing." Searching for "4074598", this update is not listed in the "Windows Security Updates", "Current Update Compliance" I downloaded and tried to install each of the following six packages. They all failed with message "The update is not applicable to your computer". 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598) 2018-02 Security Monthly Quality Rollup for Windows 7 for x86-based Systems (KB4074598) 2018-02 Security Monthly Quality Rollup for Windows Embedded Standard 7 for x64-based Systems (KB4074598) 2018-02 Security Monthly Quality Rollup for Windows Embedded Standard 7 for x86-based Systems (KB4074598) 2018-02 Security Monthly Quality Rollup for Windows Server 2008 R2 for Itanium-based Systems (KB4074598) 2018-02 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB4074598) I don't think I've ever had so much trouble from a Windows Update. 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598) Installation date: ?23/?02/?2018 12:41 Installation status: Failed Error details: Code 80242016 Update type: Important Is there some way of un-installing 4074598 so I can try to install it again? When I try Control Panel - Programs - Programs and Features - Installed Updates, it does not show KB4074598 as having been installed. Thank you for your help. . Security assessment: Potential Risk Computer name: WORKGROUP\SONYZ IP address: 192.168.1.64 Security report name: WORKGROUP - SONYZ (02-03-2018 21-11) Scan date: 02/03/2018 21:11 Scanned with MBSA version: 2.3.2211.0 Catalog synchronization date: Security update catalog: Microsoft Update Security Updates Scan Results Issue: Developer Tools, Runtimes, and Redistributables Security Updates Sco Check passed Result: No security updates are missing. Current Update Compliance | MS11-025 | Installed | Security Update for Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package (KB2538242) | Important | | MS11-025 | Installed | Security Update for Microsoft Visual C++ 2010 Service Pack 1 Redistributable Package (KB2565063) | Important | | MS11-025 | Installed | Security Update for Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package (KB2538243) | Important | Issue: Office Security Updates Sco Check passed Result: No security updates are missing. Current Update Compliance | MS10-079 | Installed | Security Update for Microsoft Word 2010 (KB2345000), 32-Bit Edition | Important | | MS10-087 | Installed | Security Update for Microsoft Office 2010 (KB2289161), 32-Bit Edition | Critical | Issue: SDK Components Security Updates Sco Check passed Result: No security updates are missing. Current Update Compliance | MS07-028 | Installed | Security Update for CAPICOM (KB931906) | Critical | Issue: SQL Server Security Updates Sco Check failed (non-critical) Result: 1 service packs or update rollups are missing. Update Rollups and Service Packs | 2546951 | Missing | Microsoft SQL Server 2008 Service Pack 3 (KB2546951) | | Current Update Compliance | MS06-061 | Installed | MSXML 6.0 RTM Security Update (925673) | Critical | Issue: Silverlight Security Updates Sco Check passed Result: No security updates are missing. Current Update Compliance | 4023307 | Installed | Security Update for Microsoft Silverlight (KB4023307) | Critical | Issue: Windows Security Updates Sco Check passed Result: No security updates are missing. Current Update Compliance | MS15-118 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3097989) | Important | | MS14-046 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2943357) | Important | | MS15-029 | Installed | Security Update for Windows 7 for x64-based Systems (KB3035126) | Important | | 2862152 | Installed | Security Update for Windows 7 for x64-based Systems (KB2862152) | | | MS16-055 | Installed | Security Update for Windows 7 for x64-based Systems (KB3156019) | Critical | | MS13-007 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2736422) | Important | | MS15-015 | Installed | Security Update for Windows 7 for x64-based Systems (KB3031432) | Important | | MS12-045 | Installed | Security Update for Windows 7 for x64-based Systems (KB2698365) | | | MS15-038 | Installed | Security Update for Windows 7 for x64-based Systems (KB3045685) | Important | | MS11-075 | Installed | Security Update for Windows 7 for x64-based Systems (KB2564958) | | | 2973351 | Installed | Security Update for Windows 7 for x64-based Systems (KB2973351) | | | MS13-099 | Installed | Security Update for Windows 7 for x64-based Systems (KB2892074) | Critical | | 2813430 | Installed | Security Update for Windows 7 for x64-based Systems (KB2813430) | | | MS15-132 | Installed | Security Update for Windows 7 for x64-based Systems (KB3108371) | Important | | 3123479 | Installed | Security Update for Windows 7 for x64-based Systems (KB3123479) | | | MS15-014 | Installed | Security Update for Windows 7 for x64-based Systems (KB3004361) | Important | | MS12-013 | Installed | Security Update for Windows 7 for x64-based Systems (KB2654428) | | | MS11-024 | Installed | Security Update for Windows 7 for x64-based Systems (KB2491683) | | | 4055532 | Installed | 2018-01 Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 on Windows 7 and Server 2008 R2 for x64 (KB4055532) | Important | | 3004375 | Installed | Security Update for Windows 7 for x64-based Systems (KB3004375) | | | MS12-054 | Installed | Security Update for Windows 7 for x64-based Systems (KB2705219) | | | 2984972 | Installed | Security Update for Windows 7 for x64-based Systems (KB2984972) | | | MS14-064 | Installed | Security Update for Windows 7 for x64-based Systems (KB3010788) | Important | | MS14-066 | Installed | Security Update for Windows 7 for x64-based Systems (KB2992611) | Critical | | MS15-117 | Installed | Security Update for Windows 7 for x64-based Systems (KB3101722) | Important | | MS14-053 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2973112) | Important | | 3148851 | Installed | Update for Windows 7 for x64-based Systems (KB3148851) | | | MS11-053 | Installed | Security Update for Windows 7 for x64-based Systems (KB2532531) | | | MS16-072 | Installed | Security Update for Windows 7 for x64-based Systems (KB3159398) | Important | | MS16-014 | Installed | Security Update for Windows 7 for x64-based Systems (KB3126587) | Important | | MS16-077 | Installed | Security Update for Windows 7 for x64-based Systems (KB3161949) | Important | | 2977292 | Installed | Security Update for Windows 7 for x64-based Systems (KB2977292) | | | MS15-041 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3037574) | Important | | MS13-082 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2861698) | Important | | MS12-072 | Installed | Security Update for Windows 7 for x64-based Systems (KB2727528) | | | MS16-019 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64 (KB3122648) | Important | | MS12-020 | Installed | Security Update for Windows 7 for x64-based Systems (KB2621440) | | | MS16-032 | Installed | Security Update for Windows 7 for x64-based Systems (KB3139914) | Important | | MS16-007 | Installed | Security Update for Windows 7 for x64-based Systems (KB3110329) | Important | | MS14-068 | Installed | Security Update for Windows 7 for x64-based Systems (KB3011780) | | | MS16-055 | Installed | Security Update for Windows 7 for x64-based Systems (KB3156016) | Critical | | MS12-033 | Installed | Security Update for Windows 7 for x64-based Systems (KB2690533) | | | MS13-004 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2742599) | Important | | MS15-004 | Installed | Security Update for Windows 7 for x64-based Systems (KB3020388) | Important | | MS16-007 | Installed | Security Update for Windows 7 for x64-based Systems (KB3109560) | Important | | MS11-076 | Installed | Security Update for Windows 7 for x64-based Systems (KB2579686) | | | MS16-082 | Installed | Security Update for Windows 7 for x64-based Systems (KB3161958) | Important | | MS16-059 | Installed | Security Update for Windows 7 for x64-based Systems (KB3150220) | Important | | MS16-007 | Installed | Security Update for Windows 7 for x64-based Systems (KB3121461) | Important | | MS14-009 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2911501) | Important | | MS14-078 | Installed | Security Update for Windows 7 for x64-based Systems (KB2991963) | Moderate | | MS14-007 | Installed | Security Update for Windows 7 for x64-based Systems (KB2912390) | Critical | | MS15-088 | Installed | Security Update for Windows 7 for x64-based Systems (KB3046017) | Important | | MS12-035 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2604115) | Critical | | 976932 | Installed | Windows 7 Service Pack 1 for x64-based Systems (KB976932) | | | MS15-080 | Installed | Security Update for Windows 7 for x64-based Systems (KB3078601) | Critical | | 2871997 | Installed | Security Update for Windows 7 for x64-based Systems (KB2871997) | | | MS16-047 | Installed | Security Update for Windows 7 for x64-based Systems (KB3149090) | Important | | MS12-082 | Installed | Security Update for Windows 7 for x64-based Systems (KB2770660) | | | MS11-030 | Installed | Security Update for Windows 7 for x64-based Systems (KB2509553) | | | MS13-081 | Installed | Security Update for Windows 7 for x64-based Systems (KB2862335) | Important | | MS16-027 | Installed | Security Update for Windows 7 for x64-based Systems (KB3138910) | Critical | | MS13-081 | Installed | Security Update for Windows 7 for x64-based Systems (KB2868038) | Important | | MS15-132 | Installed | Security Update for Windows 7 for x64-based Systems (KB3108381) | Important | | MS15-048 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3023215) | Important | | MS15-101 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3074543) | Important | | MS13-081 | Installed | Security Update for Windows 7 for x64-based Systems (KB2864202) | Important | | MS15-133 | Installed | Security Update for Windows 7 for x64-based Systems (KB3109103) | Important | | MS12-020 | Installed | Security Update for Windows 7 for x64-based Systems (KB2667402) | | | MS13-027 | Installed | Security Update for Windows 7 for x64-based Systems (KB2807986) | | | MS15-060 | Installed | Security Update for Windows 7 for x64-based Systems (KB3059317) | Important | | MS16-033 | Installed | Security Update for Windows 7 for x64-based Systems (KB3139398) | Important | | MS15-037 | Installed | Security Update for Windows 7 for x64-based Systems (KB3046269) | Important | | MS13-081 | Installed | Security Update for Windows 7 for x64-based Systems (KB2862330) | Important | | MS11-024 | Installed | Security Update for Windows 7 for x64-based Systems (KB2506212) | | | MS13-058 | Installed | Security Update for Windows 7 for x64-based Systems (KB2847927) | Important | | MS08-069 | Installed | Security Update for Microsoft XML Core Services 4.0 Service Pack 2 for x64-based Systems (KB954430) | Important | | MS15-028 | Installed | Security Update for Windows 7 for x64-based Systems (KB3030377) | Important | | MS12-034 | Installed | Security Update for Windows 7 for x64-based Systems (KB2676562) | | | MS14-039 | Installed | Security Update for Windows 7 for x64-based Systems (KB2973201) | Important | | MS13-090 | Installed | Cumulative Security Update for ActiveX Killbits for Windows 7 for x64-based Systems (KB2900986) | Critical | | MS14-057 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2972100) | Critical | | MS15-005 | Installed | Security Update for Windows 7 for x64-based Systems (KB3022777) | Important | | MS16-039 | Installed | Security Update for Windows 7 for x64-based Systems (KB3145739) | Critical | | MS15-090 | Installed | Security Update for Windows 7 for x64-based Systems (KB3060716) | Important | | MS13-081 | Installed | Security Update for Windows 7 for x64-based Systems (KB2884256) | Important | | MS14-074 | Installed | Security Update for Windows 7 for x64-based Systems (KB3003743) | Important | | MS13-098 | Installed | Security Update for Windows 7 for x64-based Systems (KB2893294) | Critical | | MS14-057 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2968294) | Important | | MS16-104 | Installed | Cumulative Security Update for Internet Explorer 11 for Windows 7 for x64-based Systems (KB3185319) | Critical | | MS15-003 | Installed | Security Update for Windows 7 for x64-based Systems (KB3021674) | Important | | MS14-046 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2937610) | Important | | MS14-026 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2931356) | Important | | 3033929 | Installed | Security Update for Windows 7 for x64-based Systems (KB3033929) | | | 2894844 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2894844) | | | MS15-109 | Installed | Security Update for Windows 7 for x64-based Systems (KB3093513) | Critical | | MS12-004 | Installed | Security Update for Windows 7 for x64-based Systems (KB2631813) | | | MS13-052 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2840631) | Important | | MS15-085 | Installed | Security Update for Windows 7 for x64-based Systems (KB3071756) | Important | | MS11-015 | Installed | Security Update for Windows 7 for x64-based Systems (KB2479943) | | | 2841134 | Installed | Internet Explorer 11 for Windows 7 for x64-based Systems | | | MS16-044 | Installed | Security Update for Windows 7 for x64-based Systems (KB3146706) | Important | | MS13-029 | Installed | Security Update for Windows 7 for x64-based Systems (KB2813347) | | | MS11-085 | Installed | Security Update for Windows 7 for x64-based Systems (KB2620704) | | | MS15-080 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 SP1 and Windows Server 2008 R2 SP1 for x64 (KB3072305) | Critical | | MS16-040 | Installed | Security Update for Windows 7 for x64-based Systems (KB3146963) | Critical | | MS11-059 | Installed | Security Update for Windows 7 for x64-based Systems (KB2560656) | | | MS15-102 | Installed | Security Update for Windows 7 for x64-based Systems (KB3084135) | Important | | MS15-050 | Installed | Security Update for Windows 7 for x64-based Systems (KB3055642) | Important | | MS14-043 | Installed | Security Update for Windows 7 for x64-based Systems (KB2978742) | Critical | | MS15-082 | Installed | Security Update for Windows 7 for x64-based Systems (KB3075226) | Important | | MS15-097 | Installed | Security Update for Windows 7 for x64-based Systems (KB3086255) | | | MS15-069 | Installed | Security Update for Windows 7 for x64-based Systems (KB3067903) | Important | | MS16-019 | Installed | Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64 (KB3127220) | Important | | 890830 | Installed | Windows Malicious Software Removal Tool x64 - February 2018 (KB890830) | | | MS16-007 | Installed | Security Update for Windows 7 for x64-based Systems (KB3108664) | Important | |
Ads |
#2
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)
lid wrote:
On Mon, 26 Feb 2018 14:34:58 -0500, Paul wrote: If you want to study "what is missing from my system", you'd use MBSA 2.3 for that. It only handles "security" patches, not "Optional" patches. The following is from MSBA 3.2. It claims "No security updates are missing." Searching for "4074598", this update is not listed in the "Windows Security Updates", "Current Update Compliance" I downloaded and tried to install each of the following six packages. They all failed with message "The update is not applicable to your computer". 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598) snip I have a theory as to what the "independent variable" is in this mess. I did an install of Win7 SP1 on the laptop, and patched it up, stopping along the way and checking stuff. I eventually got '598 installed, from WindowsUpdate (didn't need a copy from catalog.update.microsoft.com). https://s10.postimg.org/dmpt6ebbt/Wi...pdate_test.gif So I'm sailing along, installing stuff, and I get 2017-12 done, and then Windows Update simply won't offer me anything moer. I actually had to install 2017-12 twice. Once from Windows Update, where it looked like it worked, but the update history said it failed. I used the .msu from catalog.update.microsoft.com (204MB or so), and it installed and passed. The install took less time, as I think it noticed all the packages were already there in the package folder. Now, the only weird thing I did, was try to install the "Security Only" version of '598 first, and it still insisted that I needed to install the "Security Quality" (which contains "plums" as well as "security updates"). I was looking for MSE Definition files, on the off chance that I could toss those in and bring MSE definitions up to date. And instead, I happened to find this in a search. It's a new version of MSE code, and it happens to set the QualityCompat registry setting. https://support.microsoft.com/en-us/...tials-download Note that, it's an evil EXE, in that it will switch your Windows Update settings from "Never check..." to "Full Auto". I caught it before it could rush my controlled experiment. I was doing the updates in "Never check..." mode so I could control which ones were getting done. And the mseinstall thing changed the setting. Once I could find a QualityCompat in Regedit, after mseinstall, then I knew I would be seeing 2018-02 offered in Windows Update. I installed from Windows Update and it worked. It says success and there were no errors. So the only potential difference between what you did and what I did, is I used mseinstall. There are many language links on that page, and I used the English x64 version. https://download.microsoft.com/downl...mseinstall.exe And it has the capability to change the Windows Update setting so watch it. ******* And the weirdness of it all, is why is "mseinstall.exe" being delivered outside of Windows Update ? Windows Update didn't offer that to me, to break the logjam. I had to stumble on it myself, purely by accident. Paul |
#3
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)
On Sat, 03 Mar 2018 04:01:46 -0500, Paul
wrote: I downloaded and tried to install each of the following six packages. They all failed with message "The update is not applicable to your computer". 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598) snip I have a theory as to what the "independent variable" is in this mess. I did an install of Win7 SP1 on the laptop, and patched it up, stopping along the way and checking stuff. I eventually got '598 installed, from WindowsUpdate (didn't need a copy from catalog.update.microsoft.com). https://s10.postimg.org/dmpt6ebbt/Wi...pdate_test.gif So I'm sailing along, installing stuff, and I get 2017-12 done, and then Windows Update simply won't offer me anything moer. How do I remove 4074598 from Windows Update history, so I can install it again? Regarding; HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\QualityCompat\cadca5fe-87d3-4b96-b7fb-a231484277cc I give it a value of 0. Is that the correct value for QualityCompat ? I installed MS security essentials, no difference. Is it possible to get help from Microsoft in this issue? I'd consider paying a fee for competent tech support. |
#5
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)
On Sat, 03 Mar 2018 15:31:44 -0500, Paul
wrote: Is it possible to get help from Microsoft in this issue? I'd consider paying a fee for competent tech support. They are supposed to help with Windows Update problems. I spoke to MS's Indian tech support today. They basically said there was a fault in the files for that update, and I shouldn't worry about it, even without installing KB4074598 my computer would continue to work and "you're good to go". When I manually download and try to install each of the six install packages for KB4074598, each time it tells me it's not suitable for my computer. Hence, when the automatic Windows Update process tries to install the appropriate package, it fails. I'm tempted to simply give up trying to install this update KB4074598. It's just too much effort trying to get it to work. The "dism" program has some capabilities, but they differ between Windows 7 and Windows 10. The first of these, for example, can cause Windows 10 to back out a "half-installed" package. In the first command, the package doesn't have a name, and it's merely "revert whatever one is broken at the current time". DISM /image:c:\ /cleanup-image /revertpendingactions DISM /image:c:\ /remove-package /packagename: etc. I don't really know with certainty, what works on Windows 7. The DISM on Windows 7 has some features missing. When I try; DISM /image:c:\ /cleanup-image /revertpendingactions it says; C:\Windows\system32DISM /image:c:\ /cleanup-image /revertpendingactions Deployment Image Servicing and Management tool Version: 6.1.7600.16385 Error: 87 The /Image option that is specified points to a running Windows installation. To service the running operating system, use the /Online option. For more inform ation, refer to the help by running DISM.exe /Online /?. The DISM log file can be found at C:\Windows\Logs\DISM\dism.log C:\Windows\system32 When I try; DISM /online /cleanup-image /revertpendingactions C:\Windows\system32DISM /online /cleanup-image /revertpendingactions Deployment Image Servicing and Management tool Version: 6.1.7600.16385 Image Version: 6.1.7601.18489 Reverting pending actions from the image... Error: 50 This operation is only supported against an offline image. The DISM log file can be found at C:\Windows\Logs\DISM\dism.log C:\Windows\system32 When I try; DISM /image:c:\ /remove-package KB4074598 C:\Windows\system32DISM /image:c:\ /remove-package KB4074598 Error: 87 DISM doesn't recognize the command-line option "KB4074598". For more information, refer to the help by running DISM.exe /?. The DISM log file can be found at C:\Windows\Logs\DISM\dism.log C:\Windows\system32 Advice? ty |
#6
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)
and the following;
C:\Windows\system32DISM /online /remove-package:KB4074598 Deployment Image Servicing and Management tool Version: 6.1.7600.16385 Image Version: 6.1.7601.18489 An error occurred trying to open - KB4074598 Error: 0x80070003 Error: 3 The system cannot find the path specified. The DISM log file can be found at C:\Windows\Logs\DISM\dism.log C:\Windows\system32 |
#7
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)
|
#8
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)
On Sat, 03 Mar 2018 16:37:50 -0500, Paul
wrote: To do it offline, you: 1) Boot the installer DVD or the emergency boot CD that Windows 7 Backup makes for you. There is a repair option that opens a Command Prompt for you. 2) Then use the offline format. DISM /image:c:\ /remove-package KB4074598 Then you boot from optical media, and ask for the Command Prompt option, the "OS" it boots from is X:\ . The drive letters don't always have to be in the order you think. You need to use the "dir" command and check each drive letter, until you've assured yourself the letter is actual C: that you want and not D: . I have at least one setup here, where that DISM command uses D: . Offline operations like that are normally used for "bricked" systems, where you're trying to repair the OS while it's not in usage. That's why I'm not placing a lot of weight on that option. Sure, it's available. If you want to experiment, take precautions and try it out for fun. I'm not convinced though, that it'll fix everything up for you. With computers though, you never know what will happen. That's part of the "fun" I guess. I think I'm going to follow MS's advice and give up trying to install the package. It's just too much trouble. Thank you for your advice. |
#9
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)
lid wrote:
and the following; C:\Windows\system32DISM /online /remove-package:KB4074598 Deployment Image Servicing and Management tool Version: 6.1.7600.16385 Image Version: 6.1.7601.18489 An error occurred trying to open - KB4074598 Error: 0x80070003 Error: 3 The system cannot find the path specified. The DISM log file can be found at C:\Windows\Logs\DISM\dism.log C:\Windows\system32 OK, get a copy of Process Monitor, and collect a trace while DISM is doing the operation. Then, go to the file menu of Process Monitor, and untick the little tick mark, to stop the trace. Then use the filter menu, and select "Operation" "Is" and there are operation types such as "CreateFile", "ReadFile", and "WriteFile". You may be able to figure out what file it attempted to access, and did not find. https://docs.microsoft.com/en-us/sys...nloads/procmon Currently works on Vista or higher. You need an older version to be able to work with WinXP. Paul |
#10
|
|||
|
|||
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)
lid wrote:
On Sat, 03 Mar 2018 16:37:50 -0500, Paul wrote: To do it offline, you: 1) Boot the installer DVD or the emergency boot CD that Windows 7 Backup makes for you. There is a repair option that opens a Command Prompt for you. 2) Then use the offline format. DISM /image:c:\ /remove-package KB4074598 Then you boot from optical media, and ask for the Command Prompt option, the "OS" it boots from is X:\ . The drive letters don't always have to be in the order you think. You need to use the "dir" command and check each drive letter, until you've assured yourself the letter is actual C: that you want and not D: . I have at least one setup here, where that DISM command uses D: . Offline operations like that are normally used for "bricked" systems, where you're trying to repair the OS while it's not in usage. That's why I'm not placing a lot of weight on that option. Sure, it's available. If you want to experiment, take precautions and try it out for fun. I'm not convinced though, that it'll fix everything up for you. With computers though, you never know what will happen. That's part of the "fun" I guess. I think I'm going to follow MS's advice and give up trying to install the package. It's just too much trouble. Thank you for your advice. Just for fun, I was wondering whether it was possible to record an entire Windows Update. And I discovered that Sysinternals Process Monitor can do it. ProcMon has a Boot Trace option, which I've used before while tinkering. And it records what happens when the system boots. But it turns out, you can also leave Procmon running at shutdown time too. I changed the recording mode from "RAM backing store" the default, to ProcMon using a file for backing. Then, when you reach for the controls and reboot the system, Procmon nicely closes the current trace file. Then, when the system reboots, Procmon is recording the Boot Trace. And it won't stop recording the Boot Trace until you run Process Monitor again, when it will harvest the Boot Trace it's been running on. This gave me around 6GB of files, in two sets. The shutdown set. The startup set. I won't go into the details of carving that mess. I carved a file log for myself (what files are being touched). And a registry log (boring, too much data!). One thing I found, was a rather large... C:\Windows\Logs\CBS\CBS.log file. That one rolls over and starts a new file when it gets big enough. There must be 10MB of new logs in that file or so, related to 4074598. I took one of the interesting identifiers from the CBS log, and Googled it. And found this article, where a security catalog made all the downloaded files look like they were corrupted. http://www.tweaking.com/forums/index.php?topic=3310.0 So rather than bore you with more theories, I'd suggest a look in that file as a start. ******* Another curious aspect, is some "Fix" is applied, before the main ..cab is unpacked (after the download). I think BITS builds the .cab from parts, and the download is not monolithic. It's built of a thousand tiny pieces. 2018-03-04 17:31:41, Info CBS Disabling LKG boot option 2018-03-04 17:31:41, Info CBS Client specifies CbsMovePayload, or client is Windows Update, will move payload to system. 2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, Parent: Microsoft-Hyper-V-WinPE-Drivers-Package~31bf3856ad364e35~amd64~~6.1.7601.17514, Disposition = Detect, VersionComp: EQ, ServiceComp: GE, BuildComp: EQ, DistributionComp: GE, RevisionComp: GE, Exist: present 2018-03-04 17:31:41, Info CBS Appl: detectParent: package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, no parent found, go absent 2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, Parent: Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~amd64~ar-SA~6.1.7601.17514, Disposition = Detect, VersionComp: EQ, ServiceComp: GE, BuildComp: EQ, DistributionComp: GE, RevisionComp: GE, Exist: present 2018-03-04 17:31:41, Info CBS Appl: detectParent: package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, no parent found, go absent 2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, Parent: Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~amd64~en-US~6.1.7601.17514, Disposition = Detect, VersionComp: EQ, ServiceComp: GE, BuildComp: EQ, DistributionComp: GE, RevisionComp: GE, Exist: present 2018-03-04 17:31:41, Info CBS Appl: detectParent: package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, parent found: Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~amd64~en-US~6.1.7601.17514, state: Installed 2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, disposition state from detectParent: Installed 2018-03-04 17:31:41, Info CBS Appl: Evaluating package applicability for package Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3, applicable state: Installed 2018-03-04 17:31:42, Info DPX Started DPX phase: Resume and Download Job 2018-03-04 17:31:42, Info DPX Started DPX phase: Apply Deltas Provided In File 2018-03-04 17:32:20, Info DPX Ended DPX phase: Apply Deltas Provided In File 2018-03-04 17:32:20, Info DPX Ended DPX phase: Resume and Download Job 2018-03-04 17:32:20, Info CBS Extracting all files from cabinet \\?\C:\Windows\SoftwareDistribution\Download\7e79b c8b7d53185e7a729c71075a872c\Windows6.1-KB4074598-x64-EXPRESS.cab ******* From this file: C:\Windows\WindowsUpdate.log I get a short log. These are the highlights. Process kicks off (it still has to do the ~200MB download). This is when I started my Windows Update session to install 4074598. 2018-03-04 17:31:00:978 252 a98 AU AU received approval from Ux for 1 updates Last entry before reboot. (All files loaded, PendMoves all set up.) 2018-03-04 17:39:44:936 252 918 Report REPORT EVENT: {BBA17C99-97EE-4207-A5E2-49B47CA1AB42} 2018-03-04 17:39:39:929-0500 1 181 101 {73D175EA-2483-46D4-A8E3-1832178EB474} 200 0 AutomaticUpdates Success Content Install Installation Started: Windows successfully started the following update: 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598) After reboot. That gives me a timestamp to look for in my 6GB trace. 2018-03-04 17:43:35:193 492 b28 Handler Requesting post-reboot reporting for package Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3. 2018-03-04 17:43:35:193 492 b28 Handler Completed install of CBS update with type=3, requiresReboot=1, nstallerError=0, hr=0x0 2018-03-04 17:43:35:224 252 8a8 AU ## RESUMED ## AU: Installing update [UpdateId = {73D175EA-2483-46D4-A8E3-1832178EB474}, succeeded] Now, that means the C:\Windows\WindowsUpdate.log is written *one minute* before ProcMon starts logging the BootUp :-/ Which means my damn trace didn't catch the "good stuff". It's what you'd expect, as some file moving that happens during the "spinning balls" phase, you wouldn't want the OS to actually be running at the time. Anyway, the summary of this post, is to check those two files for interesting stuff. HTH, Paul |
Thread Tools | |
Display Modes | Rate This Thread |
|
|