# wufuc [![a.k.a. kb4012218-19](https://img.shields.io/badge/a.k.a.-kb4012218--19-blue.svg)](../../tree/old-kb4012218-19) [![Downloads](https://img.shields.io/github/downloads/zeffy/wufuc/total.svg) ![](https://img.shields.io/badge/downloads%20before%20v0.6-13k-brightgreen.svg)](../../releases) Disables the "Unsupported Hardware" message in Windows Update, and allows you to continue installing updates on Windows 7 and 8.1 systems with Intel Kaby Lake, AMD Ryzen, or other unsupported processors. ## Preface The changelog for Windows updates KB4012218 and KB4012219 included the following: > Enabled detection of processor generation and hardware support when PC tries to scan or download updates through Windows Update. These updates marked the implementation of a [policy change](https://blogs.windows.com/windowsexperience/2016/01/15/windows-10-embracing-silicon-innovation/) they announced some time ago, where Microsoft stated that they would not be supporting Windows 7 or 8.1 on next-gen Intel, AMD and Qualcomm processors. It was essentially a big middle finger to anyone who decides to not "upgrade" to the steaming pile of :poop: known as Windows 10. Especially considering the extended support periods for Windows 7 and 8.1 won't be ending until January 4, 2020 and January 10, 2023 respectively. There have even been people with older Intel and AMD systems who have been locked out of Windows Update because of these updates (see [#7](../../issues/7) and [this](https://answers.microsoft.com/en-us/windows/forum/windows8_1-update/amd-carrizo-ddr4-unsupported-hardware-message-on/f3fb2326-f413-41c9-a24b-7c14e6d51b0c?tab=question&status=AllReplies)). ## Bad Microsoft! If you are interested, you can read my original write up on discovering the CPU check [here](../../tree/old-kb4012218-19). Basically, inside a file called `wuaueng.dll` there are two functions: [`IsDeviceServiceable(void)`](https://gist.github.com/zeffy/e5ec266952932bc905eb0cbc6ed72185) and [`IsCPUSupported(void)`](https://gist.github.com/zeffy/1a8f8984d2bec97ae24af63a76278694). `IsDeviceServiceable(void)` is essentially a wrapper around `IsCPUSupported(void)` that caches the result it recieves and recycles it on subsequent calls. My patch takes advantage of this result caching behavior by setting the "hasn't run once" value to `FALSE` and the cached result to `TRUE`. ## How it works - At system boot the wufuc scheduled task runs as the `NT AUTHORITY\SYSTEM` user. - `wufuc` determines what service host group process the Windows Update service runs in (typically `netsvcs`), and injects itself into it. - Once injected, it applies a hook to `LoadLibraryEx` that automatically patches `wuaueng.dll` when it is loaded. - Any previously loaded `wuaueng.dll` is also patched. ### Several improvements over my xdelta3/batch script method: - **No system files are modified!** - Heuristic-based patching, which means it will usually keep working even after updates. - C is best language. - No external dependencies. ### How to install/uninstall? Just download the [latest release](../../releases/latest), and extract the `wufuc` folder to a permanent location (like `C:\Program Files\wufuc`) and then run `install_wufuc.bat` as administrator. To uninstall run `uninstall_wufuc.bat` as administrator. ### How do I remove your old patch and use this instead? I've included a utility script called `repair_wuaueng.dll.bat`. When you run it, it will initiate an `sfc` scan and revert any changes made to `wuaueng.dll`. ### How to see wufuc's debugging message output? You will need to download [DebugView](https://technet.microsoft.com/en-us/sysinternals/debugview.aspx) to do this. The best way to get a log of the entire life-cycle of wufuc is to do the following: 1. Disable wufuc by running `disable_wufuc.bat` as administrator. 2. Start `Dbgview.exe` as administrator and check `Capture -> Capture Global Win32`. 3. Enable wufuc by running `enable_wufuc.bat` as administrator. 4. Output will be shown in DebugView.