Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - dugadugadid

Pages: [1] 2
1
Thank you so much for your help and support! Much appreciated  :cheesy:

2
Finally solved, 2 months later! After 3 dist upgrades!

So I finally solved this Windows / Update BUG, it and it was as simple as this; set peerdissvc (under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\) (aka branchcache as it is known under services.msc) from disabled back to manual, along with its dependency http, to manual. I'm quite sure setting branchcache to manual was all that was necessary for the fix to take place; I also had set "not configured" to alll changes I had made to "Background Intelligence Transfer Service" under group policy regarding peer caching. I had tried the latter before the last 3 distupgrades and it did not make any difference; so it seems windows update fails if you disable branchcache, which is typically only used by businesses anyway, so many people recommend to disable it, for security reasons also. What a headache; I spent at least a 80 hours, and weeks, and months trying to figure this one out; Windows update has turned into a bunch of bull***** with their ROLLUPS; one error on one of 130 little updates and the whole shebang goes down with the ship; dumbest idea ever for their update platform; they should change to individual updates and do it quick.

This is a MICROSOFT WINDOWS UPDATE BUG. You shouldn't have to enable or disable any built in windows service to get a "windows" update working. What a headache.

SO for all of you 80004005 victims out there; check your C:\Windows\Logs\CBS\cbs.log; search for "error" or "Failed execution" know very well whatever app is failing to install, be it IIS as quoted below-> they disabled IIS and it fixed their problem, or peerdist -> I had to set it from disabled TO manual, so make sure you fiddle with enabling or disabling the failing install service using services.msc or under the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\

Change the entry "start" to demand or auto, or disable if it was already enabled, reboot, then try your update.

0 Boot
1 system
2 Automatic
3 Demand (aka manual)
4 Disabled





Another user claimed the following:

I can also attest that IIS seemed to be the culprit for me.
I disabled the services World Wide Web Publishing Service, IIS Admin Service and some others for good measure, set them all to manual, rebooted, then tried to install SP1 RC Refresh and that finally succeeded.
 I would get certain GUIDs in my CBS.log:

 
Code Block
2008-01-17 12:28:30, Error                 CSI    00000d42 (F) Failed execution of queue item Installer: Task Scheduler ({386b5911-b69e-4d2d-a3ab-796d2ec6af38}) with HRESULT 80041315 [Error,Facility=FACILITY_ITF,Code=4885 (0x1315)].  Failure will not be ignored: A rollback will be initiated after all the operations in the installer queue are completed; installer is reliable (2)[gle=0x80004005]
    Old component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6000.16386, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    New component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
CSIPERF:AIDONE;{81a34a10-4256-436a-89d6-794b97ca407c};Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral;274
2008-01-17 12:28:41, Error                 CSI    00000f12 (F) Done with generic command 110 (0x0000006e); CreateProcess returned 0, CPAW returned S_OK
Url reservation add failed, Error: 6

3
Solved, 2 months later! After 3 dist upgrades!

So I finally solved this Windows / Update BUG, it and it was as simple as this; set peerdissvc (under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\) (aka branchcache as it is known under services.msc) from disabled back to manual, along with its dependency http, to manual. I'm quite sure setting branchcache to manual was all that was necessary for the fix to take place; I also had set "not configured" to alll changes I had made to "Background Intelligence Transfer Service" under group policy regarding peer caching. I had tried the latter before the last 3 distupgrades and it did not make any difference; so it seems windows update fails if you disable branchcache, which is typically only used by businesses anyway, so many people recommend to disable it, for security reasons also. What a headache; I spent at least a 80 hours, and weeks, and months trying to figure this one out; Windows update has turned into a bunch of bull***** with their ROLLUPS; one error on one of 130 little updates and the whole shebang goes down with the ship; dumbest idea ever for their update platform; they should change to individual updates and do it quick.

This is a MICROSOFT WINDOWS UPDATE BUG. You shouldn't have to enable or disable any built in windows service to get a "windows" update working. What a headache.

SO for all of you 80004005 victims out there; check your C:\Windows\Logs\CBS\cbs.log; search for "error" or "Failed execution" know very well whatever app is failing to install, be it IIS as quoted below-> they disabled IIS and it fixed their problem, or peerdist -> I had to set it from disabled TO manual, so make sure you fiddle with enabling or disabling the failing install service using services.msc or under the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\

Change the entry "start" to demand or auto, or disable if it was already enabled, reboot, then try your update.

0 Boot
1 system
2 Automatic
3 Demand (aka manual)
4 Disabled





Another user claimed the following:

I can also attest that IIS seemed to be the culprit for me.
I disabled the services World Wide Web Publishing Service, IIS Admin Service and some others for good measure, set them all to manual, rebooted, then tried to install SP1 RC Refresh and that finally succeeded.
 I would get certain GUIDs in my CBS.log:

 
Code Block
2008-01-17 12:28:30, Error                 CSI    00000d42 (F) Failed execution of queue item Installer: Task Scheduler ({386b5911-b69e-4d2d-a3ab-796d2ec6af38}) with HRESULT 80041315 [Error,Facility=FACILITY_ITF,Code=4885 (0x1315)].  Failure will not be ignored: A rollback will be initiated after all the operations in the installer queue are completed; installer is reliable (2)[gle=0x80004005]
    Old component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6000.16386, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    New component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
CSIPERF:AIDONE;{81a34a10-4256-436a-89d6-794b97ca407c};Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral;274
2008-01-17 12:28:41, Error                 CSI    00000f12 (F) Done with generic command 110 (0x0000006e); CreateProcess returned 0, CPAW returned S_OK
Url reservation add failed, Error: 6


4
One of the things that persisted after a dist upgrade was most of the registry tweaks i used to harden my machine, including the majority of changes to terminalservices, the missing entries were still missing and I was able to install the updates after the restore which prior-to were dropping the same errors they are now.

5
I don't have a restore point going back that far and if i did it would uninstall everything on my computer; I tried editing the cab files and the install threw me an error; the certs i exported ensure the install files haven't been tampered with so I doubt that route will work,  and I haven't figured out how to use signtool.exe to sign it with them properly, it tells me "SignTool Error: No certificates were found that met all the given criteria."

6
I already made so many changes that I would be better off doing a dist upgrade again, probably will have to every month until this is figured out.  Would love an original copy of the reg files... that would help me a lot, and i can add them in by hand anyway just for the entries that i removed.

7
I ID'd the registry key because it is the only one in which I have actually removed entries pointing to system files; I wonder if this is the reason for the Windows Update failure; however it has nothing to do with peerdist.  The only thing related to peerdist aka branch cache that I have done was disabled the service peerdistsvc and its dependency http; and disabled peer caching for bits under group policy and "do not allow the computer to act as a bits peercaching server" and "do not allow the computer to act as a bits peercaching client" the two of which are (and I may be mistaken)  apparently related to branch caching.

8
This issue was such a pain I have decided to take the path of least resistance and get as much support as possible; everything found as an answer anywhere will be mentioned at all of the forums so it will be much easier for people to find the answer should one arise;

I am currently editing the cab files, and have removed all references to peerdist in _manifest_.cix.xml found in Windows6.1-KB4093118-x64.cab; hopefully that will be enough, there are other files that contain references to individual updates inside WSUSSCAN.cab but they are all given ids that don't appear to relate to anything I could find in cbs.log and no obvious reference to peerdist. I've recompiled the updated cab, and extracted the certificates from the original cab and am searching for a way to embed them into my new updated cab file; if this works, then ill have a workaround for every monthly roundup that comes along.

9
how can I uninstall peerdist (aka branch cache) manually? or how can i modify the windows update to disclude peerdist from installing?

10

My error:


2018-04-11 21:49:27, Info                  CSI    0000002e Begin executing advanced installer phase 24 (0x00000018) index 35 (0x0000000000000023) (sequence 60)
    Old component: [ml:302{151},l:300{150}]"Microsoft-Windows-PeerDist, Culture=neutral, Version=6.1.7600.16385, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS"
    New component: [ml:302{151},l:300{150}]"Microsoft-Windows-PeerDist, Culture=neutral, Version=6.1.7601.24000, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS"
    Install mode: uninstall
    Installer ID: {c145fd5d-1b9b-4738-9961-64034a3da28f}
    Installer name: [27]"Generic Command (uninstall)"
2018-04-11 21:49:27, Info                  CSI    0000002f Performing 1 operations; 1 are not lock/unlock and follow:
  LockComponentPath (10): flags: 0 comp: {l:16 b:de811fa319d2d301170000009004d804} pathid: {l:16 b:de811fa319d2d301180000009004d804} path: [l:210{105}]"\SystemRoot\WinSxS\amd64_microsoft-windows-peerdist_31bf3856ad364e35_6.1.7600.16385_none_7919860403cdb261" pid: 490 starttime: 131679821449796395 (0x01d3d219959a1b2b)
2018-04-11 21:49:27, Info                  CSI    00000030 Performing 1 operations; 1 are not lock/unlock and follow:
  LockComponentPath (10): flags: 0 comp: {l:16 b:de811fa319d2d301190000009004d804} pathid: {l:16 b:de811fa319d2d3011a0000009004d804} path: [l:210{105}]"\SystemRoot\WinSxS\amd64_microsoft-windows-peerdist_31bf3856ad364e35_6.1.7601.24000_none_7bdab59f19d5b271" pid: 490 starttime: 131679821449796395 (0x01d3d219959a1b2b)
2018-04-11 21:49:27, Info                  CSI    00000031 Calling generic command executable (sequence 1): [29]"C:\Windows\System32\netsh.exe"
    CmdLine: [100]""C:\Windows\System32\netsh.exe" http delete urlacl http://+:80/116B50EB-ECE2-41ac-8429-9F9E963361B7/"
2018-04-11 21:49:27, Info                  CSI    00000032 Performing 1 operations; 1 are not lock/unlock and follow:
  LockComponentPath (10): flags: 0 comp: {l:16 b:5f0729a319d2d3011b0000009004d804} pathid: {l:16 b:5f0729a319d2d3011c0000009004d804} path: [l:234{117}]"\SystemRoot\WinSxS\x86_microsoft.windows.s..ation.badcomponents_31bf3856ad364e35_6.1.7600.16385_none_3868158f24725705" pid: 490 starttime: 131679821449796395 (0x01d3d219959a1b2b)
2018-04-11 21:49:27, Info                  CSI    00000033 Creating NT transaction (seq 1), objectname [6]"(null)"
2018-04-11 21:49:27, Info                  CSI    00000034 Created NT transaction (seq 1) result 0x00000000, handle @0x264
2018-04-11 21:49:27, Info                  CSI    00000035@2018/4/12:04:49:27.757 CSI perf trace:
CSIPERF:TXCOMMIT;28878
2018-04-11 21:49:27, Error      [0x01800a] CSI    00000036 (F) Done with generic command 1; CreateProcess returned 0, CPAW returned S_OK
    Process exit code 1 resulted in success? FALSE
    Process output: [l:71 [71]"

URL reservation delete failed, Error: 6

The handle is invalid.





"][gle=0x80004005]
2018-04-11 21:49:27, Info                  CSI    00000039@2018/4/12:04:49:27.804 CSI Advanced installer perf trace:
CSIPERF:AIDONE;{c145fd5d-1b9b-4738-9961-64034a3da28f};Microsoft-Windows-PeerDist, Version = 6.1.7601.24000, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral;146387
2018-04-11 21:49:27, Error      [0x018008] CSI    0000003a (F) Failed execution of queue item Installer: Generic Command (uninstall) ({c145fd5d-1b9b-4738-9961-64034a3da28f}) with HRESULT HRESULT_FROM_WIN32(14109).  Failure will not be ignored: A rollback will be initiated after all the operations in the installer queue are completed; installer is reliable (2)[gle=0x80004005]
2018-04-11 21:49:27, Info                  CSI    0000003b End executing advanced installer (sequence 60)
    Completion status: HRESULT_FROM_WIN32(ERROR_ADVANCED_INSTALLER_FAILED)



2018-04-11 21:50:41, Info                  CSI    000000b3 Begin executing advanced installer phase 38 (0x00000026) index 58 (0x000000000000003a) (sequence 97)
    Old component: [ml:302{151},l:300{150}]"Microsoft-Windows-PeerDist, Culture=neutral, Version=6.1.7600.16385, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS"
    New component: [ml:302{151},l:300{150}]"Microsoft-Windows-PeerDist, Culture=neutral, Version=6.1.7601.24000, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS"
    Install mode: install
    Installer ID: {81a34a10-4256-436a-89d6-794b97ca407c}
    Installer name: [15]"Generic Command"
2018-04-11 21:50:41, Info                  CSI    000000b4 Calling generic command executable (sequence 19 (0x00000013)): [29]"C:\Windows\System32\netsh.exe"
    CmdLine: [121]""C:\Windows\System32\netsh.exe" http add urlacl url=http://+:80/116B50EB-ECE2-41ac-8429-9F9E963361B7/ sddl=D:(A;;GX;;;NS)"
2018-04-11 21:50:41, Error      [0x01800a] CSI    000000b5 (F) Done with generic command 19 (0x00000013); CreateProcess returned 0, CPAW returned S_OK
    Process exit code 1 resulted in success? FALSE
    Process output: [l:68 [68]"

Url reservation add failed, Error: 6

11
Same error I was having last month, was only able to fix this doing a Dist Upgrade.

Surt found no errors; SFC fix found no errors. WindowsUpdate.diagcab found no errors. Disabled all AV's & third party protection same errors. Clean boot, same errors.
sfc /scannow no errors

Surt:

=================================
Checking System Update Readiness.
Binary Version 6.1.7601.22471
Package Version 26.0
2018-04-11 21:31

Checking Windows Servicing Packages
Checking Package Manifests and Catalogs
Checking Package Watchlist
Checking Component Watchlist
Checking Packages
Checking Component Store

Summary:
Seconds executed: 93
No errors detected

=================================

SFCFix version 3.0.0.0 by niemiro.
Start time: 2018-04-11 22:47:24.213
Microsoft Windows 7 Service Pack 1 - amd64
Not using a script file.

AutoAnalysis::
SUMMARY: No corruptions were detected.
AutoAnalysis:: directive completed successfully.

Successfully processed all directives.
SFCFix version 3.0.0.0 by niemiro has completed.
Currently storing 1 datablocks.
Finish time: 2018-04-11 22:48:38.032
----------------------EOF-----------------------

Can someone export and provide me a clean backup of the following Windows 7 SP1 key?
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server

Attached CBS.log

https://mega.nz/#!nqITTDSY!tT0ysW0VMroMfBFyeqgsX8Q5KuGojm7rphyXZLS82vM

For me the problem resides with peerdist; I had already disabled it under services and its dependency "http" after the dist upgrade and updating windows.

Another user claimed the following:

I can also attest that IIS seemed to be the culprit for me.
I disabled the services World Wide Web Publishing Service, IIS Admin Service and some others for good measure, set them all to manual, rebooted, then tried to install SP1 RC Refresh and that finally succeeded.
 I would get certain GUIDs in my CBS.log:

 
Code Block
2008-01-17 12:28:30, Error                 CSI    00000d42 (F) Failed execution of queue item Installer: Task Scheduler ({386b5911-b69e-4d2d-a3ab-796d2ec6af38}) with HRESULT 80041315 [Error,Facility=FACILITY_ITF,Code=4885 (0x1315)].  Failure will not be ignored: A rollback will be initiated after all the operations in the installer queue are completed; installer is reliable (2)[gle=0x80004005]
    Old component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6000.16386, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    New component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
CSIPERF:AIDONE;{81a34a10-4256-436a-89d6-794b97ca407c};Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral;274
2008-01-17 12:28:41, Error                 CSI    00000f12 (F) Done with generic command 110 (0x0000006e); CreateProcess returned 0, CPAW returned S_OK
Url reservation add failed, Error: 6



associated threads
https://social.technet.microsoft.com/Forums/windows/en-US/190d5c04-a096-4546-a19b-2c4a84dfebe4/windows-rollup-kb4093118-failed-80004005?forum=w7itproinstall
https://www.sysnative.com/forums/windows-update/25172-windows-rollup-kb4093118-failed-80004005-a.html#post215693


12
If I do an in-place dist upgrade with the option (install updates) enabled, will I have the option to uninstall unwanted updates later or do these become an embedded part of the system? There are over a dozen telemetry updates that I do not want included in my installation. 

The list, for example: https://superuser.com/questions/972501/how-to-stop-microsoft-from-gathering-telemetry-data-from-windows-7-8-and-8-1#972506
and importantly: https://www.ghacks.net/2016/09/12/ancile-block-spying-on-windows-7-and-8/

Thanks

14
I read online that a In-Place Dist Upgrade of Windows 7 is possible and a better option than doing a "repair" install.  How do I do this and what are the benefits over a repair install?

15
Binance applog is giving me the same error string; 0x80004005 means "permission denied", so whoever was trying to install bits didn't have the permissions to do so. You would need to become "owner" or otherwise have such permissions. You can look at the properties of the directory to determine the owner and the security restrictions on it.

I did run a bunch of commands I had found online to reset trusted installers permissions; im thinking ill do that again;

16
Unfortunately not; I' suspect I may end up having to do a repair install; that seems to be a common even with this particular error.! But I haven't given up just yet.

17
Yes just the drivers and a few remote desktop items; I did install security compliance manager 4.0 ; sql server 2008; i was running into some issues re-installing these programs later; there was some residual sql server data left behind on the machine as they never uninstalled correctly;  Now when I try reinstall it i get this message:

Checking Security Compliance Manager Installation Prerequisite...
Node - DEVICE
ERROR:
Description = Server execution failed
Installing Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319
-------------------

Bits peerdist is the main component not installing properly; That is a component of WMF; so I installed "WMF 5.1 on Windows Server 2008 R2 and Windows 7"  The result executing it normally caused the exact same error on reboot; got to 98% then failed; Then I installed it using the included poweshell script, and it succeeded without an issue! However after this the same error occurred when running the KB4074598  again; Is there any way to install these updates with a powershell script as well?


18
I see other entries like: CBS    SQM: Ignoring upload request because the sample type is not enabled: Standard; what is trying to upload what to what?

19
Tried updating with march preview, same error; I see other entries like: CBS    SQM: Ignoring upload request because the sample type is not enabled: Standard; what is microsoft trying to upload to what?  "

CBS    SQM: Upload requested for report: PackageChangeEnd_Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, session id: 142862, sample type: Standard
CBS    SQM: Ignoring upload request because the sample type is not enabled: Standard"

"Sample type"? for what?

Microsoft-Windows-SMBMiniRdr, Version = 6.1.7601.24024, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad3
2018-03-03 05:12:09, Info                  CSI    64e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-SMBMiniRdr, Version = 6.1.7601.23915, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-QoS, Version = 6.1.7601.24000, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-QoS, Version = 6.1.7601.17514, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-exFAT, Version = 6.1.7601.23717, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-exFAT, Version = 6.1.7600.16385, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
2018-03-03 05:12:12, Info                  CSI    000000ff@2018/3/3:12:12:12.487 CSI perf trace:
CSIPERF:TXCOMMIT;199124
CBS    Startup: Primitive operations were successfully rolled back.
CBS    Setting RollbackFailed flag to 1
Error                 CBS    Startup: Rollback failed, startupPhase: 0. [HRESULT = 0x80004005 - E_FAIL]
CBS    Setting ExecuteState key to: CbsExecuteStateFailed
CBS    Doqe: Enabling Device installs
CSI    00000100 Cancelling transactions: [1:[85]"TI4.30651110_520159795:4/Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5"[1]"]"

CSI    00000101 Creating NT transaction (seq 3), objectname [6]"(null)"
CSI    00000102 Created NT transaction (seq 3) result 0x00000000, handle @0x25c
CSI    00000103@2018/3/3:12:12:15.092 CSI perf trace:
CSIPERF:TXCOMMIT;336203
CBS    Clearing HangDetect value
CBS    Saved last global progress. Current: 1, Limit: 1, ExecuteState: CbsExecuteStateFailed
CBS    Doqe: Unlocking driver updates, Count 4
CBS    WER: Generating failure report for package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, status: 0x80004005, failure source: GC, start state: Staged, target state: Installed, client id: WindowsUpdateAgent
CBS    Failed to query DisableWerReporting flag.  Assuming not set... [HRESULT = 0x80070002 - ERROR_FILE_NOT_FOUND]
CBS    Failed to add %windir%\winsxs\pending.xml to WER report because it is missing.  Continuing without it...
CBS    Failed to add %windir%\winsxs\pending.xml.bad to WER report because it is missing.  Continuing without it...
CBS    SQM: Reporting package change completion for package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, current: Installed Invalid, original: Staged, target: Installed, status: 0x80004005, failure source: GC, failure details: "80004005   netsh.exe   1   24   Uninstall (upgrade)   Microsoft-Windows-PeerDist, Culture=neutral, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS   ", client id: WindowsUpdateAgent, initiated offline: False, execution sequence: 1687, first merged sequence: 1687
CBS    SQM: Upload requested for report: PackageChangeEnd_Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, session id: 142862, sample type: Standard



Note: CBS    SQM: Upload requested for report: PackageChangeEnd_Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, session id: 142862, sample type: Standard

session id: 142862

Shadow Remote control configuration. This value becomes effective only if you set the fInheritShadow flag to 0.
0: Deny remote control.
1: Obtain user permission and interact with the session.
2: Do not obtain user permission and interact with the session.
3: Obtain user permission and display session.
4: Do not obtain user permission and display session.

Disable Remote Control of Terminal Server
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration]
"fInheritShadow"=dword:00000000
"Shadow"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fInheritInitialProgram"=dword:00000000
"fLogonDisabled"=dword:00000001

Could there be a correlation?


or possibly this:

018-03-02 02:43:54, Info                  CBS    SQM: Initializing online with Windows opt-in: False
2018-03-02 02:43:54, Info                  CBS    SQM: Cleaning up report files older than 10 days.
2018-03-02 02:43:54, Info                  CBS    SQM: Requesting upload of all unsent reports.
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start upload with file pattern: C:\Windows\servicing\sqm\*_std.sqm, flags: 0x2 [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start standard sample upload. [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Queued 0 file(s) for upload with pattern: C:\Windows\servicing\sqm\*_all.sqm, flags: 0x6
2018-03-02 02:43:54, Info                  CBS    SQM: Warning: Failed to upload all unsent reports. [HRESULT = 0x80004005 - E_FAIL]

with this:

How to stop Microsoft from gathering telemetry data from Windows 7, 8, and 8.1
https://superuser.com/questions/972501/how-to-stop-microsoft-from-gathering-telemetry-data-from-windows-7-8-and-8-1#972506

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Application-Experience/Program-Telemetry]
"Enabled"=dword:00000000

20
I just ignore it  :cheesy: Whats up with this

Quote
2018-03-02 02:43:54, Info                  CBS    SQM: Requesting upload of all unsent reports.
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start upload with file pattern: C:\Windows\servicing\sqm\*_std.sqm, flags: 0x2 [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start standard sample upload. [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Queued 0 file(s) for upload with pattern: C:\Windows\servicing\sqm\*_all.sqm, flags: 0x6
2018-03-02 02:43:54, Info                  CBS    SQM: Warning: Failed to upload all unsent reports. [HRESULT = 0x80004005 - E_FAIL]

What do they mean by "upload." Is this term used for every update taking place on the system or only a few? Is this a local system upload; online upload? Terminal Services? Makes me wonder if its uploading to some hardware component like the firmware hub; I have literally NO CLUE! I did disable a tonne of Terminal Server / Terminal services devices in the registry; even removed entries that point to remote desktop dlls and programs.

Disable Terminal Server
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server]
"TSUserEnabled"=dword:00000000
"TSAdvertise"=dword:00000000
"StartRCM"=dword:00000000
"AllowRemoteRPC"=dword:00000000
"fDenyTSConnections"=dword:00000001
"fCredentialLessLogonSupportedTSS"=dword:00000000
"fCredentialLessLogonSupportedKMRDP"=dword:00000000
"fCredentialLessLogonSupported"=dword:00000000

Core of Remote Desktop; WDS=Winstation Driver, rdpwd Remote Desktop Protocol Terminal Stack
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd]
"StartupPrograms"=-
"fAutoClientDrives"=dword:00000000
"fAutoClientLpts"=dword:00000000
"FlowHardwareRx"=dword:00000000
"FlowHardwareTx"=dword:00000000
"fFlowSoftwareRx"=dword:00000000
"fFlowSoftwareTx"=dword:00000000
"fEnableDTR"=dword:00000000
"fInheritAutoClient"=dword:000000000

Delete terminal services Sysytem Processes
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\SysProcs]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\SysProcs]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Pds\tssecsrv]
"PdDLL"=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp]
"PdDLL"=""

Shadow Remote control configuration. This value becomes effective only if you set the fInheritShadow flag to 0.
0: Deny remote control.
1: Obtain user permission and interact with the session.
2: Do not obtain user permission and interact with the session.
3: Obtain user permission and display session.
4: Do not obtain user permission and display session.

Disable Remote Control of Terminal Server
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration]
"fInheritShadow"=dword:00000000
"Shadow"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fInheritInitialProgram"=dword:00000000
"fLogonDisabled"=dword:00000001

Disable Shadow Remote Control of Winstation Console

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\Console]
"Shadow"=dword:00000000

Disable Winstation Remote destkop Console; It appears Winstation its part of Remote Desktop Terminal Server/Services, and Local System as well. Theoretically, the Local system is what we're more concerned about in relation to Intel Management.
https://blogs.technet.microsoft.com/askperf/2007/07/24/sessions-desktops-and-windows-stations/
https://msdn.microsoft.com/en-us/library/windows/desktop/ms687105(v=vs.85).aspx
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\Console\RDP]
"PdDLL"=""
"rdpwd"=""
"WsxDLL"=""

Disable Intherit Shadow Remote Control For Remote Desktop Protocal EH-Tcp

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\EH-Tcp]
"fInheritShadow"=dword:00000000

Disable Intherit Shadow Remote Control For Remote Desktop Protocal RDP-Tcp

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp]
"fInheritShadow"=dword:00000000

Info:

fAutoClientDrives: Connect to client drives upon logon.
fAutoClientLpts: Connect to client printers upon logon.
fEnableWinstation: Enable remote user sessions.
fDisableCam: Disable client audio mapping.
fDisableCcm: Disable client COM port mapping.
fDisableCdm: Disable client drive mapping.
fDisableClip: Disable clipboard mapping.
fDisableCpm: Disable Windows client printer mapping.
fDisableEncryption :Disable encryption.
fDisableExe: Disable program start upon connection.
fDisableLPT: Disable use of printers.
fEnableWinStation: Enable remote user sessions.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\EH-Tcp]
"fAutoClientDrives"=dword:00000000
"fAutoClientLpts"=dword:00000000
"fEnableWinstation"=dword:00000000
"fInheritAutoClient"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fLogonDisabled"=dword:00000001
"fDisableCam"=dword:00000001
"fDisableCcm"=dword:00000001
"fDisableCdm"=dword:00000001
"fDisableClip"=dword:00000001
"fDisableLPT"=dword:00000001
"fDisableCpm"=dword:00000001
"fDisableExe"=dword:00000001
"fInheritInitialProgram"=dword:00000000
"CdDLL"=""
"CfgDll"=""
"PdDLL"=""
"PdDLL1"=""
"WsxDLL"=""
"WdDLL"=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp]
"fAutoClientDrives"=dword:00000000
"fAutoClientLpts"=dword:00000000
"UserAuthentication"=dword:00000001
"fInheritAutoClient"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fLogonDisabled"=dword:00000001
"fDisableCcm"=dword:00000001
"fDisableCdm"=dword:00000001
"fDisableClip"=dword:00000001
"fDisableLPT"=dword:00000001
"fDisableCpm"=dword:00000001
"fDisableExe"=dword:00000001
"fInheritInitialProgram"=dword:00000000
"CdDLL"=""
"CfgDll"=""
"PdDLL"=""
"PdDLL1"=""
"WsxDLL"=""
"WdDLL"=""

USED PCHunter to modify fAcceptConnection under (trusted installer is the only thing that has permissions to change this; PChunter will keep the permissions in tact so you don't have to mess around too much)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\ConnectionHandler]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\ConnectionHandler]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\ConnectionHandler]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Control\Terminal Server\ConnectionHandler]

21
OH this is why I disabled the driver https://www.answers.com/Q/What_is_ATK_0110  "ATK 0110, the ATK0110 ACPI UTILITY (also referenced as MTsensor with MT probably meaning motherboard thermal), is a virtual device built into most Asus motherboards that is used (apparently only) by Asus software, mainly their AiBooster, AI Suite, and PC Probe II monitoring and overclocking utilities. For normal operation of Windows, this device is not necessary at all. If you do not use any software from Asus, then it is recommended to not install the driver for it (since it is quite old now), disable it in Device Manager, and hide any update for it at Windows Update. (If the driver is already installed, there should be no issues with it, but you can uninstall it using Device Manager just fine in order to save memory and CPU resources.)"

22
Quote
Good to see that you have sorted the update problem - good find.

I've never been able to get 7z to work on any of my laptops, but when a file has been compressed through the right click context menu, it will open them fine.

FRST logs are best read by those who are experienced in malware removal because a lot of what it lists can be meaningless to most.

However, the Checksur log listed a problem with Avast but FRST has Norton listed.

Which antivirus program are you using as you could have remnants of those remaining if previously used.

I was surprised to see Edge listed as well as that is a Win 10 browser.

The Additional text listed a number of problem devices - can you go Start - type devmgmt.msc and press enter then click on View/Show hidden devices to see if you have any yellow alerts, red crosses or black downward pointing arrows.

Yellow or red would denote a driver problem and the black arrow would denote something that has been disabled.

Actually the update problem persists. I notice a March rollup preview I'm thinking of trying out; though I suspect will end in the same result.

I do not use any after market anti-virus at the moment; I occasionally use windows defender; and Total Security 360; those must be remanance from when I was testing out AV software;  I've tried doing the update with on a clean boot twice. I'm definitely not using Edge; I have intentionally disabled a number of drivers and services; There is only one unknown device (yellow) whos status says unknown, but in its properties shows as on Intel(R) ICH10R LPC Interface Controller - 3A16; When trying to install a driver it says it finds ATK0110 APCI UTILITY; tries to install a driver and gives an error "System cannot find the file specified." Perhaps this is the problem.... hmm OH I SEE! the driver is in windows update waiting to be installed, I'll give it a shot.

I have disabled "high definition Audio Controller" for my video card, "PC Speaker," and "Intel(R) 82802 Firmware Hub Device" as a security measure, with its connections to the "Intel Manageability engine." I've learned that onboard speakers can be used as a listening device in reverse. And there is so much security that goes into the firmware hub I was wondering about it; much like Intel ME which is a widely known backdoor built into the motherboard itself libreboot.org/faq.html#intelme. Thankfully ME is disabled on my PC. Disabling the firmware hub had zero ill effect on the windows environment and performance. Left me kind of shocked how much bloatware they add to systems that have no real purpose or for the Windows environment and end user. I had installed last months rollup patch without a hitch with it disabled as well.  I've also disabled/removed many typically unused hard drive drivers via autoruns; brother, VIA, RAID drivers and others... as I am not using raid; and these third party drivers were severely limiting the speed of my computer; I did this long after the updates were already failing.

I blv this is the same firmware hub on my motherboard; though it came out 8 years before my motherboard was manufactured. My driver is "Intel(R) 82802 Firmware Hub Device" http://www.alldatasheet.com/datasheet-pdf/pdf/66110/INTEL/82802AB.html

The security for original was so tight they it actually had jumper pins to disable flashing at the hardware level. You can read about it in the datasheet if it interests you.


24
http://www.tomshardware.com/answers/id-2686192/win-update-working.html

This can be triggered by some pretty obscure software apparently; not sure how this guy figured his problem out but here is an example from the above link:

"I figured it out. It was the preinstalled Intel RAID storage manager software.
I uinstalled it, and Windows Update worked."

25
Still getting the same error after chkdsk /f and this; & after the windows update update.

Pages: [1] 2