System:
- Windows 11 Pro, Version 25H2, OS Build 26200.7840
- Hardware: Virtualization enabled in BIOS (confirmed via Get-ComputerInfo)
- Location: Iraq (relevant — see root cause below)
Initial Symptom: Running wsl --install hangs at 14% indefinitely. The command is attempting to enable the VirtualMachinePlatform optional feature via DISM, which never completes.
What was tried (in order):
- Checked CBS.log — found repeated
WULib DownloadProgress: [0/100] and [50/100] entries, indicating a Windows Update download loop.
- Reset Windows Update components (stopped services, renamed SoftwareDistribution and catroot2). No improvement.
- Ran
dism /online /enable-feature /featurename:VirtualMachinePlatform /all /limitaccess — failed with error 0x800f0912 (source files not found).
- Downloaded Windows 11 25H2 ISO, mounted it, attempted DISM with
/source:F:\sources\install.wim:6 /limitaccess. Command hung indefinitely — DISM ignored the local source entirely.
- Monitored CBS.log during hang — still showed WU download loop, confirming /limitaccess was being ignored.
- Booted into WinRE, copied install.wim to D:\WinSource, attempted offline DISM enable. Failed with 0x800f0912 — VirtualMachinePlatform FOD payload is not included in the standard install.wim (confirmed: it's a separate Features on Demand package not shipped in the ISO).
- Attempted in-place upgrade via setup.exe — failed at 20% with error 0x8007042B - 0x2000D (MIGRATE_DATA failure during SAFE_OS phase).
- Tried enabling via optionalfeatures.exe GUI — downloaded to 50% then stalled every time.
- Confirmed all Windows Update services were running, no WSUS configured, no proxy set in WinHTTP, hosts file clean.
- Ran
sfc /scannow — no integrity violations.
- Ran
dism /online /cleanup-image /scanhealth — returned "The component store is repairable" (corruption confirmed).
Root Cause Identified: Using PowerShell to inspect the SSL certificate being served by https://download.windowsupdate.com, the certificate returned was:
Subject: CN=*.cqloud.com
Issuer: CN=global.qwilt.com
This is NOT a Microsoft certificate. Qwilt is a transparent CDN caching system deployed by ISPs. My ISP (in Iraq) is intercepting all Windows Update HTTPS traffic and serving it through their own CDN, presenting a certificate that Windows does not trust for Windows Update connections. This causes the SSL/TLS handshake to fail silently, manifesting as an infinite hang rather than an explicit error.
This explains every single failure throughout the troubleshooting process — every DISM hang, every 50% stall, every 0x8024002e error. The feature payload was never actually downloading; Windows was just waiting on a broken TLS connection.
Further Investigation (on hotspot):
Switched to a mobile hotspot (different ISP, no transparent proxy) and ran:
dism /online /cleanup-image /restorehealth
DISM reached 100% but completed with error 0x800f0915 ("The repair content could not be found anywhere"). Monitoring CBS.log during the run revealed the following errors repeating for multiple packages:
HRESULT = 0x800f0950 - CBS_E_NO_OPTIONAL_CONTENT_FOUND_FOR_BUILD
Specifically, manifests for the following packages could not be located on Microsoft's update servers:
-
Microsoft-Hyper-V-Services-Package~31bf3856ad364e35~amd64~~10.0.26200.7840
-
Microsoft-Windows-Subsystem-Linux-Package~31bf3856ad364e35~amd64~~10.0.26200.7840
These are the exact two packages that were accidentally deleted and are the root of the WSL/Hyper-V issue. The error indicates that Microsoft's update servers do not yet have FOD packages available for build 26200.7840, meaning DISM cannot restore them regardless of internet connectivity or source path.
Additionally, a leftover WIM mount at C:\WIMMount from a previous repair attempt required cleanup via:
powershell
dism /Unmount-Image /MountDir:C:\WIMMount /Discard
dism /Cleanup-Wim
takeown /F "C:\WIMMount" /R /D Y
icacls "C:\WIMMount" /grant administrators:F /T
Remove-Item -Path "C:\WIMMount" -Recurse -Force
Current Status: The ISP TLS interception issue is bypassed via hotspot. However, DISM RestoreHealth cannot restore the missing Hyper-V and WSL packages because their FOD payloads are not yet available on Microsoft's servers for build 26200.7840. The component store corruption related to these two packages remains unresolved pending Microsoft publishing the correct FOD content.
Questions:
- Is there a permanent fix for Windows Update being intercepted by an ISP transparent proxy, short of always using a VPN or hotspot?
- Is there a way to pre-download the VirtualMachinePlatform and WSL FOD packages on another machine and install them manually, bypassing Windows Update entirely?
- Could the in-place upgrade failure (0x8007042B - 0x2000D MIGRATE_DATA) be related to the component store corruption from the missing packages, or is it a separate issue worth investigating?
- Is there a known timeline or mechanism by which Microsoft publishes FOD packages for new Insider builds like 26200.7840, and is there a way to check availability before attempting DISM again?
Thanks in advance.WSL2 install stuck at 14% / VirtualMachinePlatform cannot be enabled — Windows Update TLS broken by ISP transparent proxy