Windows 8.1 and Windows Server 2012 R2 ESU Analysis
The original Windows 7 ESU Analysis can be found here. With the ending of support for Windows 8.1 and Server 2012 R2 in 2023, additional research was conducted to see if similar techniques would work for these operating systems as well. It was determined that both Windows 8.1 and Windows Server 2012 R2 can be fully patched past the supported period.
There are 2 techniques in getting these Operating Systems up to date with the latest patches. The first technique is to copy the latest manifest file into the C:\Windows\WinSxS\Manifests folder, apply the Components registry key, and apply the SideBySide registry key. Then, installing the latest Cumulative Update will be successful.
The easier method, however, is to install the latest Cumulative Update, let it “fail”, apply the SideBySide registry key, and retry. Upon completion, the update will succeed. Both techniques have been validated on these Operating Systems.
Important: You must obtain an ESU license to apply ESU updates. Details on obtaining an ESU license can be found here. This research was completed for security vulnerability research purposes only following the Microsoft Legal Safe Harbor Terms. Do not try to reproduce without having the required licenses.
There is no ESU license option for Windows 8.1, so for security purposes if Windows 8.1 must still be used, this is an unsupported way on how to keep it patched against the latest vulnerabilities. Although the last official patch for Windows 8.1 was January 2023, here is a version of Windows 8.1 fully patched through January 2024.
Note: June 2025 was the last month Microsoft released patches that were compatible with Windows 8.1. Starting July 2025, only Windows Server 2012 R2 patches will be updated in this post.
Install The Latest Servicing Stack Update (SSU): Server 2012 R2 - KB5065767 (September 2025) / Windows 8.1 - KB5058529 (May 2025)
Install Server_2012_R2-KB5065767-x64.msu or Windows8.1-KB5058529-x64.msu and reboot the computer.
Install The Latest Monthly Cumulative Update Via Failed Reboot Technique: Server 2012 R2 - KB5065507 (September 2025) / Windows 8.1 - KB5061018 (June 2025)
- Install Server_2012_R2-KB5065507-x64.msu or Windows8.1-KB5061018-x64.msu and reboot the computer. This will result in a failed update and rollback.
- Apply the new Windows 8.1 or Server 2012 R2 SideBySide registry key linked below.
- Install KB5065507 or KB5061018 again and reboot the computer. This will result in a successful update.
Install The Latest Monthly Cumulative Update Via Manifest/Component Technique: Server 2012 R2 - KB5065507 (September 2025) / Windows 8.1 - KB5061018 (June 2025)
If using the Manifest/Components registry key technique:
- Copy the manifest file linked below into the C:\Windows\WinSxS\Manifests folder. This can be done by executing the following commands:
takeown /f C:\Windows\WinSxS\Manifests /a
icacls C:\Windows\WinSxS\Manifests /grant Everyone:(F)
copy amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.3.9600.22774_none_599e604bf64ceda2.manifest C:\Windows\WinSxS\Manifests
or for Windows 8.1:
copy amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.3.9600.22620_none_59d06cd9f627ff6a.manifest C:\Windows\WinSxS\Manifestsicacls C:\Windows\WinSxS\Manifests /remove Everyone
icacls C:\Windows\WinSxS\Manifests /setowner “NT SERVICE\TrustedInstaller”
- Apply the new Windows 8.1 or Server 2012 R2 Components registry key linked below.
- Apply the new Windows 8.1 or Server 2012 R2 SideBySide registry key linked below.
- Install Server_2012_R2-KB5065507-x64.msu or Windows8.1-KB5061018-x64.msu.
Install The Latest .NET 3.5 Update - KB5044012 (October 2024)
Install Windows8.1-KB5044012-x64.msu.
Install The Latest .NET 4.8 Update: Server 2012 R2 - KB5065752 (September 2025) / Windows 8.1 - KB5055173 (April 2025)
Install Server_2012_R2-KB5065752-x64-ndp48.msu or Windows8.1-KB5055173-x64-ndp48.msu.
Install The Latest Root Certificate Updates
Finally, the latest Microsoft Root Certificates need to be installed into the Local Computer Trusted Root Authority Certificate Store. A batch file to automatically install all certificates and revocation lists can be found here: Import.cmd
References
These files can all be found on GitHub here. See below for specific file links.
Windows 8.1 x64 Manifest File KB5061018
Windows 8.1 x64 Components Registry Key KB5061018
Windows 8.1 SideBySide Registry Key KB5061018
Windows Server 2012 R2 x64 Manifest File KB5065507
Update 2025-09-17
- Replaced Windows Server 2012 R2 May 2025 Servicing Stack Update (KB5058529) with September 2025 Servicing Stack Update (KB5065767).
- Replaced Windows Server 2012 R2 August 2025 Monthly Update (KB5063950) with September 2025 Monthly Update (KB5065507).
- Replaced Windows Server 2012 R2 July 2025 .NET Framework 4.8 Update (KB5062157) with September 2025 .NET Framework 4.8 Update (KB5065752).
- Replaced Windows Server 2012 R2 August 2025 Manifest, Components Registry Key, and SideBySide Registry Key (6.3.9600.22725) with September 2025 (6.3.9600.22774).
- Updated MicRooCerAut_2010-06-23.crl.
- Updated Microsoft ECC Product Root Certificate Authority 2018.crl.
- Updated Microsoft ECC TS Root Certificate Authority 2018.crl.
- Updated Microsoft EV ECC Root Certificate Authority 2017.crl.
- Updated Microsoft EV RSA Root Certificate Authority 2017.crl.
For previous updates to this post, see Windows 8.1 and Windows Server 2012 R2 ESU Analysis Changelog.