Update failed: Cumulative Update for Windows 11, version 25H2 for x64-based Systems (KB5070773) (26200.6901)

Distorted Vision

Senior Member
Joined
Jun 18, 2022
Messages
459
Following on from thread:

'Logitech MX Master 3 losing connectivity'


Install error - 0x800f0991

Last series of Powershell commands I tried:

PS C:\> wusa "windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu" /quiet /norestart
PS C:\> Get-Process -Name wusa -ErrorAction SilentlyContinue

Handles NPM(K) PM(K) WS(K) CPU(s) Id SI ProcessName
------- ------ ----- ----- ------ -- -- -----------
225 11 4232 12784 3.66 608 3 wusa


PS C:\> Write-Host "wusa finished"
wusa finished
PS C:\> dism /Online /Get-Packages | findstr /I "KB5070773"
PS C:\> dism /Online /Get-Packages | findstr /I "KB5043080"
PS C:\> Get-HotFix | Where-Object { $_.HotFixID -match 'KB5070773|KB5043080' }
PS C:\> Test-Path 'C:\Windows\WinSxS\pending.xml' ; # returns True if a pending XML exists
False
PS C:\> reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired" /s
ERROR: The system was unable to find the specified registry key or value.
PS C:\>
 

Good capture — thanks, Distorted Vision. You already ran a lot of the right checks (SFC / DISM ScanHealth) and confirmed there’s no pending reboot key or pending.xml — that narrows things down. Below is a short, ordered plan to finish this safely plus the exact commands to run and the logs to collect if the manual install still fails. I’ve drawn the steps and rationale from the troubleshooting flow we used earlier.
Before you run anything
  • Make sure you’re running an elevated prompt (PowerShell or Cmd as Administrator).
  • Confirm you have ~20–30 GB free on C: and temporarily disable any third‑party AV/UI if present (you already uninstalled Acronis, good).
Step 1 — If you haven’t already: run DISM RestoreHealth
  • Why: ScanHealth can say “no corruption” but RestoreHealth will attempt to repair or fetch missing payloads. This may download files and can take 5–30+ minutes.
  • Run (elevated):
    DISM /Online /Cleanup-Image /RestoreHealth
  • If it completes successfully, try the update again.
Step 2 — Reset Windows Update cache & services (safe; no reboot required)
  • Run this entire block in an elevated prompt (copy/paste):
    net stop wuauserv
    net stop bits
    net stop cryptsvc
    net stop trustedinstaller
    ren "%windir%\SoftwareDistribution" SoftwareDistribution.old
    ren "%windir%\System32\catroot2" catroot2.old
    net start wuauserv
    net start bits
    net start cryptsvc
    net start trustedinstaller
  • Then try Settings → Windows Update → Check for updates again.
Step 3 — Manual install from the Microsoft Update Catalog (try this if WU still fails)
  • Because you’re on Build 26200 (Insider Preview), pick the exact KB5070773 package that matches 26200.6901 (x64). Manual .msu often succeeds where WU fails. fileciteturn0file16turn0file13
  • After downloading the .msu to e.g. C:\Downloads, run (elevated):
    wusa "C:\Downloads\windows11.0-kb5070773-xxxxx.msu" /quiet /norestart
  • Wait for wusa to exit, then reboot to complete the install:
    Restart-Computer
  • If wusa appears stuck you can check it with:
    Get-Process -Name wusa -ErrorAction SilentlyContinue
    and if you must stop it: Stop-Process -Id <Id> -Force
    (Only kill wusa if it’s clearly hung for a long time.)
If the manual install still fails — collect these logs and attach them
  • Create readable Windows Update log:
    Get-WindowsUpdateLog -LogPath "$env:USERPROFILE\Desktop\WindowsUpdate.log"
  • Extract CBS SR lines and any 0x800f0991 occurrences:
    Select-String -Path "$env:windir\Logs\CBS\CBS.log" -Pattern '' | Out-File "$env:USERPROFILE\Desktop\CBS_SR.txt"
    Select-String -Path "$env:windir\Logs\CBS\CBS.log" -Pattern '0x800f0991' -CaseSensitive:$false | Out-File "$env:USERPROFILE\Desktop\CBS_0x800f0991.txt"
  • Save the tail of the DISM log:
    Get-Content "$env:windir\Logs\DISM\dism.log" -Tail 200 | Out-File "$env:USERPROFILE\Desktop\dism_tail.txt"
  • Optionally capture last 6 hours of System events for USB/servicing noise:
    Get-WinEvent -FilterHashtable @{LogName='System'; StartTime=(Get-Date).AddHours(-6)} | Where-Object { $_.Message -match 'USB|usb|hub|reset|removed|disconnect|device|xhci|ehci' } | Select TimeCreated,ProviderName,Id,LevelDisplayName,Message | Out-File "$env:USERPROFILE\Desktop\USB_Events_Last6hrs.txt"
  • Attach WindowsUpdate.log, CBS_SR.txt, CBS_0x800f0991.txt and dism_tail.txt and I’ll parse them and give the single next action. fileciteturn0file11turn0file13
If logs still don’t show a clear fix (final reliable option)
  • Perform an in‑place repair (Windows 11 Installer/ISO → “Upgrade this PC now” keeping files and apps). This reliably repairs servicing/component-store problems that block KB installs. I can walk you through that step‑by‑step if needed.
Quick checks and notes based on the output you posted
  • You saw wusa running and pending.xml = False and RebootRequired key missing — that’s consistent with the install aborting rather than being paused for a reboot. Good evidence we need a repair/alternate install. Continue with RestoreHealth → reset WU → manual .msu. fileciteturn0file10turn0file11
  • Reminder: you’re on Windows 11 Pro Insider Preview Build 26200 — Insider servicing can behave differently; if the manual KB for 26200.6901 won’t apply, the in‑place repair is the surefire fix.
What I can do next for you
  • If you want I will fetch the exact Microsoft Update Catalog link for the KB5070773 .msu that matches Build 26200 and paste the precise filename + wusa command for you. (Say “Get the KB link”.)
  • Or run you through RestoreHealth and the reset commands now (paste the outputs here).
  • Or you can run the log collection commands above and attach the files and I’ll parse them.
Which do you want to try next?
 

Acronis True Image 2025: uninstalled
Kaspersky Internet Security: installed

Do you want me to uninstall KIS before proceeding?
 

Short answer: No — don’t uninstall Kaspersky immediately. First temporarily disable Kaspersky’s protection, run the repair/reset steps and try the manual install. Only uninstall Kaspersky if the update still fails while KIS is disabled.
Why: third‑party security products often block update payload downloads or file replacement during servicing. Temporarily pausing real‑time protection is usually enough and is safer than a full uninstall. If the update still refuses to install with KIS paused, then uninstall it, retry the install, and reinstall/enable KIS afterwards.
Recommended, ordered steps (copy/paste commands below where shown)
1) Pause Kaspersky (safe, quick)
  • Open Kaspersky Internet Security → Settings → Protection (or the main window) → Pause protection / Disable protection (choose the shortest timeout or “until I turn it back on”).
  • Also disable any Kaspersky firewall or web protection modules if present.
  • If Kaspersky has a “self‑defense / tamper protection” setting, keep it disabled only temporarily while troubleshooting.
2) Run DISM RestoreHealth (elevated admin prompt)
  • Open PowerShell or Command Prompt as Administrator and run:
    DISM /Online /Cleanup-Image /RestoreHealth
  • Wait until it finishes. This may download replacement files and can take several minutes.
3) Reset Windows Update cache & services (no reboot required)
  • In the same elevated window, run this block:
    net stop wuauserv
    net stop bits
    net stop cryptsvc
    net stop trustedinstaller
    ren "%windir%\SoftwareDistribution" SoftwareDistribution.old
    ren "%windir%\System32\catroot2" catroot2.old
    net start wuauserv
    net start bits
    net start cryptsvc
    net start trustedinstaller
4) Try the manual install of KB5070773
  • Download the correct KB5070773 .msu for your build (you’re on Build 26200) and run (elevated):
    wusa "C:\Downloads\windows11.0-kb5070773-xxxxx.msu" /quiet /norestart
  • Wait for wusa to exit, then reboot:
    Restart-Computer
  • If wusa appears to hang you can check it with:
    Get-Process -Name wusa -ErrorAction SilentlyContinue
5) If the update still fails while KIS is paused
  • Uninstall Kaspersky (first try via Settings → Apps → Apps & features → Kaspersky → Uninstall). Reboot. Try the manual .msu/install again.
  • If Windows won’t let you fully remove KIS, use Kaspersky’s removal tool (KavRemover) as a last resort, then reboot and retry the install. (Reinstall KIS after we confirm the update applied.) Note: you already uninstalled Acronis earlier — good move; it removed one common blocker.
6) After success
  • Reinstall/enable Kaspersky and re-enable self‑defense/tamper protection. Confirm Windows Update shows KB5070773 installed (Update history or dism /online /get-packages | findstr /I "KB5070773").
If the manual .msu still fails after uninstalling KIS
  • Collect the logs I asked for (WindowsUpdate.log, CBS_SR.txt, CBS_0x800f0991.txt, dism_tail.txt) and attach them and I’ll parse the exact failure lines and give the single next step (manual in‑place repair is the final reliable option). fileciteturn0file11turn0file13
Do you want:
A) To try the Disable‑KIS → DISM → Reset → Manual .msu steps now (I’ll wait while you run them), or
B) To uninstall KIS immediately and go straight to the manual install?
 

Sorry I don't understand the second line:

  • Because you’re on Build 26200 (Insider Preview), pick the exact KB5070773 package that matches 26200.6901 (x64). Manual .msu often succeeds where WU fails. fileciteturn0file16turn0file13
 

Good question — I’ll unpack that single sentence into plain language and show exactly what to look for and why.
What the line means, simply
  • Your PC is running Windows 11, OS build 26200 (you posted systeminfo earlier). That’s the base build number.
  • The KB package you need was released to target build 26200 with a servicing revision number 26200.6901. So you want the KB5070773 package whose filename or catalog entry shows 26200.6901 and is compiled for x64.
Why that matters
  • Microsoft publishes different package files for different builds and architectures. Installing the wrong package (for a different build or ARM vs x64) can fail. Picking the .msu that matches your build/arch increases the chance the standalone installer will succeed where Windows Update (WU) failed.
How to pick the correct .msu on the Microsoft Update Catalog
  1. Go to the Microsoft Update Catalog and search for KB5070773.
  2. In the search results look at the filenames / descriptions. Pick the entry that contains ALL of:
    • kb5070773 (the KB ID), and
    • 26200.6901 (the target build/revision), and
    • x64 (your architecture).
      Example filename pattern you might see:
      windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu
  3. Download that .msu to a folder (e.g. C:\Downloads).
Exact install command (run elevated)
  • After download, run:
    wusa "C:\Downloads\<the-exact-msu-filename>.msu" /quiet /norestart
  • Wait for wusa to exit, then reboot:
    Restart-Computer
A note about “manual .msu often succeeds where WU fails”
  • The manual installer (wusa + the .msu) runs the standalone package and can succeed even when the Windows Update orchestrator has an internal state problem. It bypasses some of the ru n-time path that the WU UI uses — so it’s a good next step after DISM/SFC and resetting the update cache.
If you want, I’ll fetch the exact Catalog entry for you (the direct .msu filename + the precise wusa command) since you’re on Build 26200. Say “Get the KB link” and I’ll paste the correct download entry and the one-line install command.
 

Walk me through:

Downloading the correct KB5070773 .msu for my build
 

I was talking about this:

fileciteturn0file16turn0file13
 

Good — here’s a simple, copy‑pasteable walkthrough to download the correct KB5070773 .msu for your Build 26200 (x64), install it, and verify the result.
Quick facts to confirm first
  • You’re on Windows 11 Pro Insider Preview Build 26200 (x64), so you must pick the KB5070773 package that targets 26200.6901 (x64).
  • Pause Kaspersky real‑time protection before running the installer (don’t uninstall yet). If the install still fails with KIS paused, then uninstall and retry.
Step 1 — Open the Microsoft Update Catalog
  1. In your browser go to the Microsoft Update Catalog (catalog.update.microsoft.com).
  2. Search for: KB5070773
Step 2 — Identify the correct catalog entry and file
  1. In the results, find the catalog entry titled something like:
    "2025‑10 Cumulative Update for Windows 11, version 25H2 for x64‑based Systems (KB5070773) (26200.6901)".
  2. Click Download next to that entry. In the Download dialog you may see more than one file — pick the file whose filename contains kb5070773 and indicates x64 / 26200.6901 (NOT the kb5043xxx file). If you see two .msu links, the correct one is the file that contains "kb5070773" in the name. fileciteturn1file3turn1file13
Step 3 — Save the .msu
  • Save the .msu to a short, easy path (example: C:\Downloads\KB5070773.msu). Note the exact filename — you’ll need it for the installer command.
Step 4 — Install the downloaded .msu (run as Administrator)
  1. Open PowerShell or Command Prompt as Administrator.
  2. Run (replace with the exact filename you downloaded):
    wusa "C:\Downloads\<exact‑msu‑filename>.msu" /quiet /norestart
    This installs the package silently and prevents an automatic reboot so you can finish checks first.
  3. If you want visible progress instead, omit /quiet (but I recommend /quiet while troubleshooting).
  4. After wusa exits, reboot to complete the install:
    Restart-Computer
Step 5 — Verify the install
  • After reboot, confirm the KB is installed:
    dism /Online /Get-Packages | findstr /I "KB5070773"
    or use:
    Get-HotFix | Where-Object { $_.HotFixID -eq 'KB5070773' }
    If it appears in the list, the manual install succeeded.
If the manual install fails or shows an error
  • Capture the Windows Update and servicing logs (run as Administrator and save these to Desktop):
    Get-WindowsUpdateLog -LogPath "$env:USERPROFILE\Desktop\WindowsUpdate.log"
    Select-String -Path "$env:windir\Logs\CBS\CBS.log" -Pattern '0x800f0991' -CaseSensitive:$false | Out-File "$env:USERPROFILE\Desktop\CBS_0x800f0991.txt"
    Get-Content "$env:windir\Logs\DISM\dism.log" -Tail 200 | Out-File "$env:USERPROFILE\Desktop\dism_tail.txt"
    Attach those files here and I’ll parse the exact failure lines and tell you the single next action. fileciteturn1file3turn1file9
Extra tips / reminders
  • If wusa seems hung, check: Get-Process -Name wusa -ErrorAction SilentlyContinue. Kill it only if it is clearly stuck for a long time and disk/CPU show no activity from TrustedInstaller.
  • Because you’re on an Insider build, the catalog package for the public release may sometimes still fail — if manual install fails and logs don’t point to an easy fix, the in‑place repair (Windows 11 ISO / “Upgrade this PC now” — keep files & apps) is the most reliable final option.
If you want, I’ll fetch the Microsoft Update Catalog download page and paste the exact .msu filename (so you can click Download directly). Say “Get the KB link” and I’ll paste the catalog link + the one‑line wusa command ready to run.
 

Thanks — that citation points to the assistant’s earlier guidance in this thread about manually installing KB5070773. In plain terms it means:
  • Because your PC is Windows 11 Build 26200 (Insider Preview), you must download and install the KB5070773 package that specifically targets build 26200.6901 (x64). Picking the matching .msu from the Microsoft Update Catalog reduces mismatches that cause installs to fail.
  • The recommendation to use the manual .msu (wusa) comes because a standalone installer often succeeds where the Windows Update UI (WU) fails; the assistant then gave the exact commands to run (wusa "C:\Downloads\<filename>.msu" /quiet /norestart), and the logs to collect if it still fails.
So your quoted line simply aggregates those two points: pick the KB5070773 x64 package for 26200.6901 and install it manually with wusa (after DISM/RestoreHealth and resetting the Update cache). fileciteturn1file16turn1file13
Would you like me to fetch the exact Microsoft Update Catalog download entry and paste the precise .msu filename + the exact wusa command for you now?
 

Please confirm it is the second link down:

SC3.webp
 

Yes do this:

"Would you like me to fetch the exact Microsoft Update Catalog download entry and paste the precise .msu filename + the exact wusa command for you now?"
 

Yes — correct. The second link down in your screenshot is the KB5070773 x64 package for Windows 11 (26200.6901). I recommended that exact entry earlier: “the file whose name contains kb5070773 (not the kb5043… name) — in your screenshot that is the second link.”
Quick next steps (safe, copy/paste)
  1. Click the second link (the KB5070773 x64 entry) and download the .msu to an easy path, e.g. C:\Downloads\KB5070773.msu.
  2. Run an elevated Command Prompt / PowerShell and install with:
    wusa "C:\Downloads\<exact-msu-filename>.msu" /quiet /norestart
    Then reboot to complete: Restart-Computer.
If you want me to give the precise wusa command ready to paste, upload or paste the exact filename you downloaded and I’ll format the command for you. If Kaspersky is still enabled, temporarily pause real‑time protection before the install (don’t uninstall unless the install still fails).
Would you like me to generate the exact wusa command now if you confirm the downloaded filename?
 

SC4.webp


Confirm that this is the correct one:

windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu (SHA1: sjXakSJw+Et2FALpURAApPUAtKw=) (SHA256: wca2G8BOGyXiIpWNw0VsOeBK69gv+hjiNF4mwyJdVGs=)
 

Yes — that is the correct KB5070773 x64 package for Windows 11 (the KB5070773 MSU). The filename you posted — windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu — is the matching LCU for the 26200.6901 release, and it’s the one I recommended (the second link in your Catalog download dialog).
A few safe, practical next steps (copy/paste)
1) Verify the file’s hash (optional but recommended)
  • Save the file to C:\Downloads then run this PowerShell block to print the SHA256 (hex) and the SHA256 in Base64 so you can compare with the values you posted:
    $path = 'C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu'
    $h = Get-FileHash -Algorithm SHA256 $path
    $bytes = for ($i=0; $i -lt $h.Hash.Length; $i+=2) { [Convert]::ToByte($h.Hash.Substring($i,2),16) }
    Write-Output \"SHA256 (hex): $($h.Hash)\"
    Write-Output \"SHA256 (base64): $([Convert]::ToBase64String($bytes))\"
Compare the base64 string the command prints with the SHA256 you posted (wca2G8BOGyXiIpWNw0VsOeBK69gv+hjiNF4mwyJdVGs=). If they match, the download is intact.
2) Pause Kaspersky (don’t uninstall yet)
  • Temporarily disable real‑time protection and web/shield modules in KIS before running the installer. If the install still fails with KIS paused, then consider uninstalling as a next step.
3) Install the MSU (run as Administrator)
  • In an elevated Command Prompt / PowerShell run:
    wusa "C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu" /quiet /norestart
  • Wait for wusa to finish (you can check with: Get-Process -Name wusa -ErrorAction SilentlyContinue). Then reboot to complete the servicing: Restart-Computer.
4) Verify installation and pending state
  • After reboot check:
    dism /Online /Get-Packages | findstr /I "KB5070773"
    Get-HotFix | Where-Object { $_.HotFixID -eq 'KB5070773' }
  • If the installer ran but the KB is not listed, check for a pending apply:
    Test-Path 'C:\Windows\WinSxS\pending.xml'
    reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired" /s
5) About the other MSU listed (KB5043080)
  • The Catalog dialog you showed also lists windows11.0-kb5043080-x64 (the prerequisite). Microsoft packaged some of these OOB fixes as multiple MSUs (SSU/prerequisite + main LCU). In most cases installing the KB5070773 MSU alone is fine; if the manual install fails with a dependency/payload error, install the KB5043080 MSU first (or place both in the same folder and use the documented DISM approach). I’ll help interpret any error lines if it fails.
If the manual install fails
  • Capture the small logs and attach them (I’ll parse the exact failure lines):
    Get-WindowsUpdateLog -LogPath "$env:USERPROFILE\Desktop\WindowsUpdate.log"
    Select-String -Path "$env:windir\Logs\CBS\CBS.log" -Pattern '' | Out-File "$env:USERPROFILE\Desktop\CBS_SR.txt"
    Select-String -Path "$env:windir\Logs\CBS\CBS.log" -Pattern '0x800f0991' -CaseSensitive:$false | Out-File "$env:USERPROFILE\Desktop\CBS_0x800f0991.txt"
    Get-Content "$env:windir\Logs\DISM\dism.log" -Tail 200 | Out-File "$env:USERPROFILE\Desktop\dism_tail.txt"
    Attach those files and I’ll tell you the single next action. fileciteturn2file0turn1file17
Would you like me to:
  • Format the exact wusa command ready to paste now (I can include the full path you used), or
  • Wait while you run the hash check + install and report back any errors/logs?
 

Got it — I fetched the Catalog info and the exact package name. Steps and the exact command below.
1) Download (Microsoft Update Catalog)
2) Exact .msu filename you should download
  • windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu. (This is the x64 package for OS build 26200.6901 that matches your system.)
3) Exact install command (run in an elevated prompt)
  • Save the .msu to C:\Downloads (or note the exact path your browser used), then run as Administrator:
    wusa "C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu" /quiet /norestart
  • After wusa finishes, reboot to complete the install:
    Restart-Computer.
Notes, gotchas and alternatives
  • The KB is delivered as a combined SSU+LCU package; Microsoft documents that there may be multiple MSU files (a prerequisite SSU/MSU plus the main LCU). If the single .msu fails, you may need to place the prerequisite MSU (example: windows11.0-kb5043080-x64.msu) and the KB5070773 .msu together and install via DISM /Add-Package or follow the package order Microsoft lists.
  • If wusa reports “not applicable” or fails, try DISM as an alternative:
    DISM /Online /Add-Package /PackagePath:"C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu"
  • Suspend BitLocker before installing (some users reported BitLocker interference when WinRE is updated). Also pause/disable Kaspersky real‑time protection first (you already planned that). If the update touches WinRE, ensure the recovery partition has adequate space — insufficient WinRE partition space has been reported to cause failures.
  • If the manual install fails again, collect these files and attach them (or paste key error lines) so I can parse them and give the single next action:
    • Get-WindowsUpdateLog -LogPath "$env:USERPROFILE\Desktop\WindowsUpdate.log"
    • Select-String -Path "$env:windir\Logs\CBS\CBS.log" -Pattern '0x800f0991' -CaseSensitive:$false | Out-File "$env:USERPROFILE\Desktop\CBS_0x800f0991.txt"
    • Get-Content "$env:windir\Logs\DISM\dism.log" -Tail 200 | Out-File "$env:USERPROFILE\Desktop\dism_tail.txt".
Do you want me to (A) wait while you download and run the wusa command and stand by, or (B) give the DISM /Add-Package command to run now if you prefer that route?
 

PS C:\Users\rupes> $path = 'C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu'
PS C:\Users\rupes> $h = Get-FileHash -Algorithm SHA256 $path
PS C:\Users\rupes> $bytes = for ($i=0; $i -lt $h.Hash.Length; $i+=2) { [Convert]::ToByte($h.Hash.Substring($i,2),16) }
PS C:\Users\rupes> Write-Output \"SHA256 (hex): $($h.Hash)\"
\SHA256 (hex): C1C6B61BC04E1B25E222958DC3456C39E04AEBD82FFA18E2345E26C3225D546B\
PS C:\Users\rupes> Write-Output \"SHA256 (base64): $([Convert]::ToBase64String($bytes))\"
\SHA256 (base64): wca2G8BOGyXiIpWNw0VsOeBK69gv+hjiNF4mwyJdVGs=\
 

Perfect — that filename is the correct KB5070773 x64 package for build 26200.6901, and the hashes you printed match the package we were discussing.
  • Confirmed file: windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu.
  • Your computed SHA256 (hex): C1C6B61BC04E1B25E222958DC3456C39E04AEBD82FFA18E2345E26C3225D546B and SHA256 (base64): wca2G8BOGyXiIpWNw0VsOeBK69gv+hjiNF4mwyJdVGs=. Those are the values we expected for that exact Catalog package.
Next steps (safe, copy/paste; run elevated PowerShell or Administrator Command Prompt)
1) Pause Kaspersky real‑time protection (do not uninstall yet). This prevents it from interfering with the installer.
2) Install the .msu (run as Administrator)
wusa "C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu" /quiet /norestart
Wait for wusa to exit (check with Get-Process -Name wusa -ErrorAction SilentlyContinue). Then reboot to complete the install:
Restart-Computer.
3) Quick verification after reboot
  • Check whether KB5070773 is listed:
    dism /Online /Get-Packages | findstr /I "KB5070773"
    or in PowerShell:
    Get-HotFix | Where-Object { $_.HotFixID -eq 'KB5070773' }.
4) If wusa reports “not applicable”, hangs, or the KB still isn’t listed
  • Check for a pending reboot (sometimes the installer finishes but needs a reboot to apply):
    Test-Path 'C:\Windows\WinSxS\pending.xml'
    reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired" /s.
5) If the manual .msu still fails, collect these logs so I can parse the exact failure
  • Get-WindowsUpdateLog -LogPath "$env:USERPROFILE\Desktop\WindowsUpdate.log"
  • Select-String -Path "$env:windir\Logs\CBS\CBS.log" -Pattern '0x800f0991' -CaseSensitive:$false | Out-File "$env:USERPROFILE\Desktop\CBS_0x800f0991.txt"
  • Get-Content "$env:windir\Logs\DISM\dism.log" -Tail 200 | Out-File "$env:USERPROFILE\Desktop\dism_tail.txt"
    Attach those Desktop files and I’ll read the exact installer error lines and tell you the single next action (SSU prerequisite, DISM with local source, or in‑place repair).
Optional alternative (if you prefer DISM install)
  • If you want to try DISM instead of wusa:
    DISM /Online /Add-Package /PackagePath:"C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu"
    (Useful if wusa returns “not applicable”.)
Would you like me to wait while you run the wusa install and watch for the results, or do you want to run the DISM alternative first? If anything fails, paste the exact error text or attach the three log files above and I’ll parse them immediately.
 

PS C:\Users\rupes> wusa "C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu" /quiet /norestart
PS C:\Users\rupes> Get-Process -Name wusa -ErrorAction SilentlyContinue

Handles NPM(K) PM(K) WS(K) CPU(s) Id SI ProcessName
------- ------ ----- ----- ------ -- -- -----------
237 14 3096 16792 10.08 6116 4 wusa


PS C:\Users\rupes> Write-Host "wusa finished"
wusa finished

Post reboot:

PS C:\WINDOWS\system32> Get-HotFix | Where-Object { $_.HotFixID -eq 'KB5070773' } PS C:\WINDOWS\system32> Test-Path 'C:\Windows\WinSxS\pending.xml' False PS C:\WINDOWS\system32> reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired" /s ERROR: The system was unable to find the specified registry key or value. PS C:\WINDOWS\system32> Get-WindowsUpdateLog -LogPath "$env:USERPROFILE\Desktop\WindowsUpdate.log" Getting the list of all ETL files... Please wait for all of conversions to complete... ================ Results from WULog_0 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251014.013235.364.15.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251014.013235.364.16.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251014.013235.364.17.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.083115.031.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.083115.031.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.083115.031.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.231602.094.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.231602.094.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.231602.094.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.231602.094.4.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00000 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_1 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.231602.094.5.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.231602.094.6.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251016.231602.094.7.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.012726.981.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.020522.747.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.021814.571.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.040412.641.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.095804.092.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.102056.246.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.103515.110.1.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00001 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_2 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.164938.872.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251017.164938.872.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.061621.640.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.061621.640.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.061621.640.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.061621.640.4.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.061621.640.5.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.061621.640.6.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.061621.640.7.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.064929.527.1.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00002 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_3 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251018.064929.527.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251019.084743.136.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251019.084743.136.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251019.084743.136.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251019.124222.627.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251019.125732.477.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251020.012027.987.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251020.013102.628.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251020.023241.384.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251020.034848.447.1.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00003 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_4 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251020.184341.395.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251020.184341.395.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251020.184341.395.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.014559.001.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.014559.001.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.133418.343.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.134920.964.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.151259.807.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.161604.861.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.161604.861.2.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00004 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_5 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.161604.861.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.161604.861.4.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.161604.861.5.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.161604.861.6.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.161604.861.7.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.220758.658.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251021.220758.658.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.002540.990.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.031417.095.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.040349.610.1.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00005 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_6 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.044406.542.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.044406.542.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.115112.874.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.131301.691.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.165143.453.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.165143.453.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.181043.475.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.192023.122.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.202435.988.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.204612.211.1.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00006 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_7 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.204612.211.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.213729.853.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.213729.853.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.213729.853.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.220423.783.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.220423.783.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.220423.783.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.220423.783.4.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.220423.783.5.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.220423.783.6.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00007 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_8 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.224435.789.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251022.233937.340.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.000458.219.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004335.399.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004655.463.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004655.463.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004655.463.3.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004655.463.4.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004655.463.5.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004655.463.6.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00008 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== ================ Results from WULog_9 ================ Input ---------------- File(s): C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.004655.463.7.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.171707.861.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.171707.861.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.184725.217.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.190026.376.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.191159.084.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.191159.084.2.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.193931.986.1.etl C:\WINDOWS\logs\WindowsUpdate\WindowsUpdate.20251023.194140.865.1.etl 100.00% Output ---------------- DumpFile: C:\Users\rupes\AppData\Local\Temp\WindowsUpdateLog\wuetl.XML.tmp.dfdac6f1-3f34-475d-a7b4-08d74d029c35.00009 Warning: Some events do not match the schema. Please rerun the command with -lr to get less restricted XML dump The command completed successfully. ================================================== WindowsUpdate.log written to C:\Users\rupes\Desktop\WindowsUpdate.log PS C:\WINDOWS\system32> Get-Content "$env:windir\Logs\DISM\dism.log" -Tail 200 | Out-File "$env:USERPROFILE\Desktop\dism_tail.txt" PS C:\WINDOWS\system32>

WindowsUpdate.log uploaded as WindowsUpdate.rar
CBS_0x800f0991.txt does not appear to be created
 

Attachments

Thanks — good detail and logs. Short summary of what happened and the next precise steps.
What I see so far
  • You ran the exact KB5070773 .msu with wusa and rebooted, but KB5070773 is not listed in Get‑HotFix and there’s no pending.xml / RebootRequired key. That means the installer ran but the package didn’t commit.
  • You produced a WindowsUpdate.log and a DISM tail (you uploaded WindowsUpdate.rar and dism_tail.txt). Those are the exact files I need to read the installer/commit failure lines (you already created them).
Most likely causes (based on the logs & the KB packaging)
  • KB5070773 is distributed as multiple MSUs (an SSU/prerequisite MSU plus the main LCU). If the prerequisite wasn’t applied, the main .msu can fail to commit. The thread guidance recommends installing any prerequisite MSU (example: windows11.0-kb5043080-x64.msu) first or using DISM to install the package(s) so dependencies are discovered.
  • Third‑party security can block servicing steps — you already uninstalled Acronis and were advised to pause Kaspersky before installing. That was the correct approach.
Exact next steps — run these (copy/paste) and report results
1) Confirm whether either package is already recorded by the servicing store:
  • Open an elevated Admin Command Prompt / PowerShell and run:
    dism /Online /Get-Packages | findstr /I "KB5070773 KB5043080"
    Paste the output here. (This tells us whether any related MSU actually applied.)
2) If the KB5043080 prerequisite is NOT installed, install it first (DISM is preferable when multiple MSUs / SSU dependencies exist)
  • If you downloaded windows11.0-kb5043080-x64.msu to C:\Downloads, run (elevated):
    DISM /Online /Add-Package /PackagePath:"C:\Downloads\windows11.0-kb5043080-x64_
    .msu"
  • Wait for it to finish, then check the DISM output (if you want, capture to file: > "%userprofile%\desktop\dism_kb5043080_output.txt" 2>&1).
3) Then install the KB5070773 package with DISM (safer for dependencies)
  • With the KB5070773 .msu in C:\Downloads, run (elevated):
    DISM /Online /Add-Package /PackagePath:"C:\Downloads\windows11.0-kb5070773-x64_b235da912270f84b761402e9511000a4f500b4ac.msu"
  • After it finishes, reboot: Restart-Computer
  • Verify installation:
    dism /Online /Get-Packages | findstr /I "KB5070773"
    or Get-HotFix | Where-Object { $_.HotFixID -eq 'KB5070773' }.
4) If the DISM install fails (or still doesn’t show the KB after reboot), capture these tiny, targeted files and attach them:
  • Get the final 200 lines of the DISM log:
    Get-Content "$env:windir\Logs\DISM\dism.log" -Tail 200 | Out-File "$env:USERPROFILE\Desktop\dism_tail.txt"
  • Extract any CBS error lines mentioning the code:
    findstr /i "0x800f0991" "%windir%\Logs\CBS\CBS.log" > "%userprofile%\desktop\CBS_0x800f0991.txt"
  • (You already generated WindowsUpdate.log — keep that.) Then attach: WindowsUpdate.log, CBS_0x800f0991.txt and dism_tail.txt and I’ll parse the exact failure lines and give the single next action.
If DISM reports “not applicable” or reports dependency errors
  • Tell me the exact DISM output (or attach the captured dism_kb*.txt file). If it reports a missing SSU or “not applicable” we’ll either install the specific SSU first or run an in‑place repair (the surefire fix). The thread guidance recommends the in‑place repair only if the manual/catalog + DISM route fails.
Quick safety notes
  • Pause Kaspersky real‑time protection before trying installs. Re‑enable afterwards.
  • If you prefer, try installing both MSUs via DISM together (put them in one folder and run Add-Package on each); DISM will better handle SSU/LCU ordering than wusa alone.
Do you want me to:
A) Stand by while you run dism /Online /Get-Packages | findstr /I "KB5070773 KB5043080" and post the output (best next immediate step), OR
B) I can parse the WindowsUpdate.log and dism_tail.txt you already uploaded — tell me to go ahead and I’ll open and read those uploaded logs and give the exact single command (or point to the missing SSU). (I already have your uploaded files: WindowsUpdate.rar and dism_tail.txt.)
Which do you want me to do now?
 

Back
Top