Windows Server 2008 R2 - Windows Update not working Error 0x80070002

Thank you again. I at last have some good news for you :) I have tracked down the origin of the final bits of data (KB2722913 & KB2647170). I will now put together a fix for you.

Richard
 
More notes to myself:

Code:
[HKEY_LOCAL_MACHINE\COMPONENTS\DerivedData\Components\amd64_2390289ee5c3271071978108ecbd70f4_31bf3856ad364e35_9.4.8112.16448_none_6f47c7036aeaddcf]
"S256H"=hex:f7,7f,c5,5d,c3,cc,40,4d,06,b1,b0,d4,76,33,c7,95,e6,3a,00,e4,c3,58,c9,30,c3,15,eb,82,b9,c3,37,91
"identity"=hex:32,33,39,30,32,38,39,65,65,35,63,33,32,37,31,30,37,31,39,37,\
  38,31,30,38,65,63,62,64,37,30,66,34,2c,20,43,75,6c,74,75,72,65,3d,6e,65,75,\
  74,72,61,6c,2c,20,56,65,72,73,69,6f,6e,3d,39,2e,34,2e,38,31,31,32,2e,31,36,\
  34,34,38,2c,20,50,75,62,6c,69,63,4b,65,79,54,6f,6b,65,6e,3d,33,31,62,66,33,\
  38,35,36,61,64,33,36,34,65,33,35,2c,20,50,72,6f,63,65,73,73,6f,72,41,72,63,\
  68,69,74,65,63,74,75,72,65,3d,61,6d,64,36,34,2c,20,76,65,72,73,69,6f,6e,53,\
  63,6f,70,65,3d,4e,6f,6e,53,78,53
"ClosureFlags"=dword:00000003
"c!2390289ee5c3271071978108ecbd70f4_31bf3856ad364e35_9.4.8112.16448_none_6f47c7036aeaddcf"=hex:

[HKEY_LOCAL_MACHINE\COMPONENTS\DerivedData\Components\amd64_28361266d67f4dc224f350a009d0c747_31bf3856ad364e35_9.4.8112.20554_none_2191ec6647b6f2f3]
"S256H"=hex:bb,15,a5,64,bc,f5,60,b5,22,82,26,6d,3f,f9,f1,d6,6b,70,71,22,45,48,9a,9a,7a,e4,13,c3,5a,7d,f0,f9
"identity"=hex:32,38,33,36,31,32,36,36,64,36,37,66,34,64,63,32,32,34,66,33,\
  35,30,61,30,30,39,64,30,63,37,34,37,2c,20,43,75,6c,74,75,72,65,3d,6e,65,75,\
  74,72,61,6c,2c,20,56,65,72,73,69,6f,6e,3d,39,2e,34,2e,38,31,31,32,2e,32,30,\
  35,35,34,2c,20,50,75,62,6c,69,63,4b,65,79,54,6f,6b,65,6e,3d,33,31,62,66,33,\
  38,35,36,61,64,33,36,34,65,33,35,2c,20,50,72,6f,63,65,73,73,6f,72,41,72,63,\
  68,69,74,65,63,74,75,72,65,3d,61,6d,64,36,34,2c,20,76,65,72,73,69,6f,6e,53,\
  63,6f,70,65,3d,4e,6f,6e,53,78,53
"ClosureFlags"=dword:00000003
"c!28361266d67f4dc224f350a009d0c747_31bf3856ad364e35_9.4.8112.20554_none_2191ec6647b6f2f3"=hex:

I think this leaves me one more identity and one more deployments key.
 
Thanks Richard! I'm looking foward to the fix that you are putting together.

No problem, sorry it is slow. This last part is hard. Usually we can get away with installing a similar system (well, I already have virtual PCs with every system combination I am likely to encounter) and we just grab the registry. However, this is not possible here. Instead, I must take data from the Windows Update files only and try to generate the registry key from that, in exactly the same way that Windows Update does. This is slightly tricky because not all of the keys and values are well understood, or their rules for generation. However, I am getting better all the time, and I have been documenting keys, values, data meanings & generation rules. In a couple of months time, I hope to complete my documentation and write up my complete understanding of the exact mechanisms Windows Update uses, and what all of this registry data means and how it links together. But for now, I shall keep plugging away at your deployments key :p

Richard
 
One last set of notes to myself:

Code:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\COMPONENTS\CanonicalData\Deployments\0418a9e851f..19424223cde_31bf3856ad364e35_6.1.7601.21885_0c6904fa38783dfe]
"appid"=hex:30,34,31,38,61,39,65,38,35,31,66,32,65,38,33,35,35,35,35,38,31,31,\
  39,34,32,34,32,32,33,63,64,65,2c,20,43,75,6c,74,75,72,65,3d,6e,65,75,74,72,\
  61,6c,2c,20,56,65,72,73,69,6f,6e,3d,36,2e,31,2e,37,36,30,31,2e,32,31,38,38,\
  35,2c,20,50,75,62,6c,69,63,4b,65,79,54,6f,6b,65,6e,3d,33,31,62,66,33,38,35,\
  36,61,64,33,36,34,65,33,35,2c,20,50,72,6f,63,65,73,73,6f,72,41,72,63,68,69,\
  74,65,63,74,75,72,65,3d,61,6d,64,36,34,2c,20,76,65,72,73,69,6f,6e,53,63,6f,\
  70,65,3d,4e,6f,6e,53,78,53
"CatalogThumbprint"="9f591fa4d07dc1195d3e8778c8eb09c3a75948c1a49b31fb893a10d17ee5d720"
"p!CBS_package_1_for_kb2647170~31bf3856ad364e35~amd64~~6.1.1.0.2647_0647faf36cd995c8"=hex:4e,\
  00,00,00,01,00,00,00,50,61,63,6b,61,67,65,5f,31,5f,66,6f,72,5f,4b,42,32,36,\
  34,37,31,37,30,7e,33,31,62,66,33,38,35,36,61,64,33,36,34,65,33,35,7e,61,6d,\
  64,36,34,7e,7e,36,2e,31,2e,31,2e,30,2e,32,36,34,37,31,37,30,2d,32,5f,6e,65,\
  75,74,72,61,6c,5f,4c,44,52,34
"p!CBS_package_1_for_kb2647170~31bf3856ad364e35~amd64~~6.1.1.0.2647_913d55c0b4318959"=hex:4e,\
  00,00,00,01,00,00,00,50,61,63,6b,61,67,65,5f,31,5f,66,6f,72,5f,4b,42,32,36,\
  34,37,31,37,30,7e,33,31,62,66,33,38,35,36,61,64,33,36,34,65,33,35,7e,61,6d,\
  64,36,34,7e,7e,36,2e,31,2e,31,2e,30,2e,32,36,34,37,31,37,30,2d,31,5f,6e,65,\
  75,74,72,61,6c,5f,4c,44,52,32

This is everything now, except for one last tiny detail. BRB.
 
Hello again :)

First please run this SFCFix Script.

Code:
LoadHive::
COMPONENTS

Then this .reg script:

Code:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\COMPONENTS\DerivedData\Components\amd64_2390289ee5c3271071978108ecbd70f4_31bf3856ad364e35_9.4.8112.16448_none_6f47c7036aeaddcf]
"S256H"=hex:f7,7f,c5,5d,c3,cc,40,4d,06,b1,b0,d4,76,33,c7,95,e6,3a,00,e4,c3,58,c9,30,c3,15,eb,82,b9,c3,37,91
"identity"=hex:32,33,39,30,32,38,39,65,65,35,63,33,32,37,31,30,37,31,39,37,\
  38,31,30,38,65,63,62,64,37,30,66,34,2c,20,43,75,6c,74,75,72,65,3d,6e,65,75,\
  74,72,61,6c,2c,20,56,65,72,73,69,6f,6e,3d,39,2e,34,2e,38,31,31,32,2e,31,36,\
  34,34,38,2c,20,50,75,62,6c,69,63,4b,65,79,54,6f,6b,65,6e,3d,33,31,62,66,33,\
  38,35,36,61,64,33,36,34,65,33,35,2c,20,50,72,6f,63,65,73,73,6f,72,41,72,63,\
  68,69,74,65,63,74,75,72,65,3d,61,6d,64,36,34,2c,20,76,65,72,73,69,6f,6e,53,\
  63,6f,70,65,3d,4e,6f,6e,53,78,53
"ClosureFlags"=dword:00000003
"c!2390289ee5c3271071978108ecbd70f4_31bf3856ad364e35_9.4.8112.16448_none_6f47c7036aeaddcf"=hex:

[HKEY_LOCAL_MACHINE\COMPONENTS\DerivedData\Components\amd64_28361266d67f4dc224f350a009d0c747_31bf3856ad364e35_9.4.8112.20554_none_2191ec6647b6f2f3]
"S256H"=hex:bb,15,a5,64,bc,f5,60,b5,22,82,26,6d,3f,f9,f1,d6,6b,70,71,22,45,48,9a,9a,7a,e4,13,c3,5a,7d,f0,f9
"identity"=hex:32,38,33,36,31,32,36,36,64,36,37,66,34,64,63,32,32,34,66,33,\
  35,30,61,30,30,39,64,30,63,37,34,37,2c,20,43,75,6c,74,75,72,65,3d,6e,65,75,\
  74,72,61,6c,2c,20,56,65,72,73,69,6f,6e,3d,39,2e,34,2e,38,31,31,32,2e,32,30,\
  35,35,34,2c,20,50,75,62,6c,69,63,4b,65,79,54,6f,6b,65,6e,3d,33,31,62,66,33,\
  38,35,36,61,64,33,36,34,65,33,35,2c,20,50,72,6f,63,65,73,73,6f,72,41,72,63,\
  68,69,74,65,63,74,75,72,65,3d,61,6d,64,36,34,2c,20,76,65,72,73,69,6f,6e,53,\
  63,6f,70,65,3d,4e,6f,6e,53,78,53
"ClosureFlags"=dword:00000003
"c!28361266d67f4dc224f350a009d0c747_31bf3856ad364e35_9.4.8112.20554_none_2191ec6647b6f2f3"=hex:

[HKEY_LOCAL_MACHINE\COMPONENTS\CanonicalData\Deployments\0418a9e851f..19424223cde_31bf3856ad364e35_6.1.7601.21885_0c6904fa38783dfe]
"appid"=hex:30,34,31,38,61,39,65,38,35,31,66,32,65,38,33,35,35,35,35,38,31,31,\
  39,34,32,34,32,32,33,63,64,65,2c,20,43,75,6c,74,75,72,65,3d,6e,65,75,74,72,\
  61,6c,2c,20,56,65,72,73,69,6f,6e,3d,36,2e,31,2e,37,36,30,31,2e,32,31,38,38,\
  35,2c,20,50,75,62,6c,69,63,4b,65,79,54,6f,6b,65,6e,3d,33,31,62,66,33,38,35,\
  36,61,64,33,36,34,65,33,35,2c,20,50,72,6f,63,65,73,73,6f,72,41,72,63,68,69,\
  74,65,63,74,75,72,65,3d,61,6d,64,36,34,2c,20,76,65,72,73,69,6f,6e,53,63,6f,\
  70,65,3d,4e,6f,6e,53,78,53
"CatalogThumbprint"="9f591fa4d07dc1195d3e8778c8eb09c3a75948c1a49b31fb893a10d17ee5d720"
"p!CBS_package_1_for_kb2647170~31bf3856ad364e35~amd64~~6.1.1.0.2647_3277ABB530C41A90"=hex:4e,\
  00,00,00,01,00,00,00,50,61,63,6b,61,67,65,5f,31,5f,66,6f,72,5f,4b,42,32,36,\
  34,37,31,37,30,7e,33,31,62,66,33,38,35,36,61,64,33,36,34,65,33,35,7e,61,6d,\
  64,36,34,7e,7e,36,2e,31,2e,31,2e,30,2e,32,36,34,37,31,37,30,2d,32,5f,6e,65,\
  75,74,72,61,6c,5f,4c,44,52,34
"p!CBS_package_1_for_kb2647170~31bf3856ad364e35~amd64~~6.1.1.0.2647_92FA3F58446B556A"=hex:4e,\
  00,00,00,01,00,00,00,50,61,63,6b,61,67,65,5f,31,5f,66,6f,72,5f,4b,42,32,36,\
  34,37,31,37,30,7e,33,31,62,66,33,38,35,36,61,64,33,36,34,65,33,35,7e,61,6d,\
  64,36,34,7e,7e,36,2e,31,2e,31,2e,30,2e,32,36,34,37,31,37,30,2d,31,5f,6e,65,\
  75,74,72,61,6c,5f,4c,44,52,32

This is the closest I can get it, and I hope that it is enough. You have to understand that I am working off reverse engineered registry formats here, and some of it I still do not fully understand. This is the best I can do, so let's hope it's enough :) New SURT log please.

Fingers crossed, good luck!

Richard
 
Last edited:
Thank you rechard for the last post. I imported the SFCFix script and imported the registry keys but unfortunately that did not seem to have resolved the issue. I have attached new SURT logs. Let me know if there is anything else you can do, I really appreciate your effort trying to fix this!
 
Hello again :)

This is really strange to be honest. I would like to see the whole registry hive so I can check for damages in lots of locations (with CSI C Mark Deployment Not Marked, when it isn't the simple case, the corruption can be in many locations. Rather than taking a ton of registry exports, let's just look at the whole hive.) And I'll look into the other stuff too.

Please download the Freeware RegBak from here: Acelogix Software - Download products

Navigate to C:\Windows\RegBak\{Date}\ and copy the COMPONENTS file to your Desktop. If the COMPONENTS file does not exist, please fetch it instead from C:\Windows\System32\config\COMPONENTS.

Now right click on it > Send to > Compressed (zipped) folder.

Then please upload it to your favourite file sharing website (it will be too big for here). If you have a Microsoft Account, SkyDrive could be a good choice: https://skydrive.live.com/, but any other will do just fine.

Thank you!

Richard
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top