Author Topic: [Solved Finally!] Windows Update Failure [7SP1 x64] KB4074598 [0x80004005]  (Read 20147 times)

0 Members and 1 Guest are viewing this topic.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Hey guys! New to the forum! Absolutely amazed with the content on here! Your help would be greatly appreciated.

CheckSURLog, and other logs attached.

Tried clean boot install; Did an offline sfc scan (zero integrity violations) Still receiving this error.

The computer successfully installs the update, on reboot while configuring updates, it hits 98% complete then fails. Registry settings show Trusted Installer "start" set to (2) before restarting. I see no group policy for trusted installer after updating policy with Security Compliance Manager 4.0;

Dism /Online /Cleanup-Image /ScanHealth = CBS.log

2018-03-02   01:44:12:651   344   1140   Handler   Post-reboot status for package Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24055.1.3: 0x80004005.
2018-03-02   01:44:12:651   344   1140   Handler   WARNING: Got extended error: "Generic Command   ErrorCode   80004005   Executable   netsh.exe   ExitCode   1   Phase   24   Mode   Uninstall (upgrade)   Component   Microsoft-Windows-PeerDist, Culture=neutral, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS"

2018-03-02 02:43:54, Info                  CBS    Ending TrustedInstaller initialization.
2018-03-02 02:43:54, Info                  CBS    Starting the TrustedInstaller main loop.
2018-03-02 02:43:54, Info                  CBS    TrustedInstaller service starts successfully.
2018-03-02 02:43:54, Info                  CBS    SQM: Initializing online with Windows opt-in: False
2018-03-02 02:43:54, Info                  CBS    SQM: Cleaning up report files older than 10 days.
2018-03-02 02:43:54, Info                  CBS    SQM: Requesting upload of all unsent reports.
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start upload with file pattern: C:\Windows\servicing\sqm\*_std.sqm, flags: 0x2 [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start standard sample upload. [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Queued 0 file(s) for upload with pattern: C:\Windows\servicing\sqm\*_all.sqm, flags: 0x6
2018-03-02 02:43:54, Info                  CBS    SQM: Warning: Failed to upload all unsent reports. [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    No startup processing required, TrustedInstaller service was not set as autostart, or else a reboot is still pending.
2018-03-02 02:43:54, Info                  CBS    NonStart: Checking to ensure startup processing was not required.
2018-03-02 02:43:54, Info                  CSI    00000004 IAdvancedInstallerAwareStore_ResolvePendingTransactions (call 1) (flags = 00000004, progress = NULL, phase = 0, pdwDisposition = @0x111f6b0
2018-03-02 02:43:54, Info                  CSI    00000005 Creating NT transaction (seq 1), objectname [6]"(null)"
2018-03-02 02:43:54, Info                  CSI    00000006 Created NT transaction (seq 1) result 0x00000000, handle @0x200
2018-03-02 02:43:54, Info                  CSI    00000007@2018/3/2:09:43:54.041 CSI perf trace:
CSIPERF:TXCOMMIT;200
2018-03-02 02:43:54, Info                  CBS    NonStart: Success, startup processing not required as expected.
2018-03-02 02:43:54, Info                  CBS    Startup processing thread terminated normally
2018-03-02 02:43:54, Info                  CSI    00000008 CSI Store 5485296 (0x000000000053b2f0) initialized
2018-03-02 02:43:54, Info                  CBS    Session: 30650890_4197273720 initialized by client DISM Package Manager Provider.
2018-03-02 02:44:14, Info                  CBS    Archived backup log: C:\Windows\Logs\CBS\CbsPersist_20180302094353.cab.

Any advice?
« Last Edit: April 12, 2018, 10:38:18 AM by dugadugadid »

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
What is this "standard sample upload" is the trusted installer trying to upload data to microsoft or is this an offline deal?

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
I don't have anything to open the Checksur log.

Can you save it as a .txt file and attach it that way.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
It is a 7z file.  This is the contents of it.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
this:

net stop wuauserv
net stop cryptSvc
net stop bits
net stop msiserver
Ren C:\Windows\SoftwareDistribution SoftwareDistribution.old
Ren C:\Windows\System32\catroot2 Catroot2.old
net start wuauserv
net start cryptSvc
net start bits
net start msiserver
net start wuauserv

resulted in finding two new updates; on of which kb3159706; that contains some improvements to Windows Update Client in Windows 7 Service Pack 1 (SP1)

going to do that prior to the rollup patch.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Still getting the same error after chkdsk /f and this; & after the windows update update.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
http://www.tomshardware.com/answers/id-2686192/win-update-working.html

This can be triggered by some pretty obscure software apparently; not sure how this guy figured his problem out but here is an example from the above link:

"I figured it out. It was the preinstalled Intel RAID storage manager software.
I uinstalled it, and Windows Update worked."

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
FRST logs

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
Good to see that you have sorted the update problem - good find.

I've never been able to get 7z to work on any of my laptops, but when a file has been compressed through the right click context menu, it will open them fine.

FRST logs are best read by those who are experienced in malware removal because a lot of what it lists can be meaningless to most.

However, the Checksur log listed a problem with Avast but FRST has Norton listed.

Which antivirus program are you using as you could have remnants of those remaining if previously used.

I was surprised to see Edge listed as well as that is a Win 10 browser.

The Additional text listed a number of problem devices - can you go Start - type devmgmt.msc and press enter then click on View/Show hidden devices to see if you have any yellow alerts, red crosses or black downward pointing arrows.

Yellow or red would denote a driver problem and the black arrow would denote something that has been disabled.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Quote
Good to see that you have sorted the update problem - good find.

I've never been able to get 7z to work on any of my laptops, but when a file has been compressed through the right click context menu, it will open them fine.

FRST logs are best read by those who are experienced in malware removal because a lot of what it lists can be meaningless to most.

However, the Checksur log listed a problem with Avast but FRST has Norton listed.

Which antivirus program are you using as you could have remnants of those remaining if previously used.

I was surprised to see Edge listed as well as that is a Win 10 browser.

The Additional text listed a number of problem devices - can you go Start - type devmgmt.msc and press enter then click on View/Show hidden devices to see if you have any yellow alerts, red crosses or black downward pointing arrows.

Yellow or red would denote a driver problem and the black arrow would denote something that has been disabled.

Actually the update problem persists. I notice a March rollup preview I'm thinking of trying out; though I suspect will end in the same result.

I do not use any after market anti-virus at the moment; I occasionally use windows defender; and Total Security 360; those must be remanance from when I was testing out AV software;  I've tried doing the update with on a clean boot twice. I'm definitely not using Edge; I have intentionally disabled a number of drivers and services; There is only one unknown device (yellow) whos status says unknown, but in its properties shows as on Intel(R) ICH10R LPC Interface Controller - 3A16; When trying to install a driver it says it finds ATK0110 APCI UTILITY; tries to install a driver and gives an error "System cannot find the file specified." Perhaps this is the problem.... hmm OH I SEE! the driver is in windows update waiting to be installed, I'll give it a shot.

I have disabled "high definition Audio Controller" for my video card, "PC Speaker," and "Intel(R) 82802 Firmware Hub Device" as a security measure, with its connections to the "Intel Manageability engine." I've learned that onboard speakers can be used as a listening device in reverse. And there is so much security that goes into the firmware hub I was wondering about it; much like Intel ME which is a widely known backdoor built into the motherboard itself libreboot.org/faq.html#intelme. Thankfully ME is disabled on my PC. Disabling the firmware hub had zero ill effect on the windows environment and performance. Left me kind of shocked how much bloatware they add to systems that have no real purpose or for the Windows environment and end user. I had installed last months rollup patch without a hitch with it disabled as well.  I've also disabled/removed many typically unused hard drive drivers via autoruns; brother, VIA, RAID drivers and others... as I am not using raid; and these third party drivers were severely limiting the speed of my computer; I did this long after the updates were already failing.

I blv this is the same firmware hub on my motherboard; though it came out 8 years before my motherboard was manufactured. My driver is "Intel(R) 82802 Firmware Hub Device" http://www.alldatasheet.com/datasheet-pdf/pdf/66110/INTEL/82802AB.html

The security for original was so tight they it actually had jumper pins to disable flashing at the hardware level. You can read about it in the datasheet if it interests you.

« Last Edit: March 03, 2018, 03:39:45 AM by dugadugadid »

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
Okay - let me know how you get on with both updates.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
OH this is why I disabled the driver https://www.answers.com/Q/What_is_ATK_0110  "ATK 0110, the ATK0110 ACPI UTILITY (also referenced as MTsensor with MT probably meaning motherboard thermal), is a virtual device built into most Asus motherboards that is used (apparently only) by Asus software, mainly their AiBooster, AI Suite, and PC Probe II monitoring and overclocking utilities. For normal operation of Windows, this device is not necessary at all. If you do not use any software from Asus, then it is recommended to not install the driver for it (since it is quite old now), disable it in Device Manager, and hide any update for it at Windows Update. (If the driver is already installed, there should be no issues with it, but you can uninstall it using Device Manager just fine in order to save memory and CPU resources.)"

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
So I assume you will just hide that one then ?

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
I just ignore it  :cheesy: Whats up with this

Quote
2018-03-02 02:43:54, Info                  CBS    SQM: Requesting upload of all unsent reports.
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start upload with file pattern: C:\Windows\servicing\sqm\*_std.sqm, flags: 0x2 [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start standard sample upload. [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Queued 0 file(s) for upload with pattern: C:\Windows\servicing\sqm\*_all.sqm, flags: 0x6
2018-03-02 02:43:54, Info                  CBS    SQM: Warning: Failed to upload all unsent reports. [HRESULT = 0x80004005 - E_FAIL]

What do they mean by "upload." Is this term used for every update taking place on the system or only a few? Is this a local system upload; online upload? Terminal Services? Makes me wonder if its uploading to some hardware component like the firmware hub; I have literally NO CLUE! I did disable a tonne of Terminal Server / Terminal services devices in the registry; even removed entries that point to remote desktop dlls and programs.

Disable Terminal Server
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server]
"TSUserEnabled"=dword:00000000
"TSAdvertise"=dword:00000000
"StartRCM"=dword:00000000
"AllowRemoteRPC"=dword:00000000
"fDenyTSConnections"=dword:00000001
"fCredentialLessLogonSupportedTSS"=dword:00000000
"fCredentialLessLogonSupportedKMRDP"=dword:00000000
"fCredentialLessLogonSupported"=dword:00000000

Core of Remote Desktop; WDS=Winstation Driver, rdpwd Remote Desktop Protocol Terminal Stack
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd]
"StartupPrograms"=-
"fAutoClientDrives"=dword:00000000
"fAutoClientLpts"=dword:00000000
"FlowHardwareRx"=dword:00000000
"FlowHardwareTx"=dword:00000000
"fFlowSoftwareRx"=dword:00000000
"fFlowSoftwareTx"=dword:00000000
"fEnableDTR"=dword:00000000
"fInheritAutoClient"=dword:000000000

Delete terminal services Sysytem Processes
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\SysProcs]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\SysProcs]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Pds\tssecsrv]
"PdDLL"=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp]
"PdDLL"=""

Shadow Remote control configuration. This value becomes effective only if you set the fInheritShadow flag to 0.
0: Deny remote control.
1: Obtain user permission and interact with the session.
2: Do not obtain user permission and interact with the session.
3: Obtain user permission and display session.
4: Do not obtain user permission and display session.

Disable Remote Control of Terminal Server
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration]
"fInheritShadow"=dword:00000000
"Shadow"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fInheritInitialProgram"=dword:00000000
"fLogonDisabled"=dword:00000001

Disable Shadow Remote Control of Winstation Console

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\Console]
"Shadow"=dword:00000000

Disable Winstation Remote destkop Console; It appears Winstation its part of Remote Desktop Terminal Server/Services, and Local System as well. Theoretically, the Local system is what we're more concerned about in relation to Intel Management.
https://blogs.technet.microsoft.com/askperf/2007/07/24/sessions-desktops-and-windows-stations/
https://msdn.microsoft.com/en-us/library/windows/desktop/ms687105(v=vs.85).aspx
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\Console\RDP]
"PdDLL"=""
"rdpwd"=""
"WsxDLL"=""

Disable Intherit Shadow Remote Control For Remote Desktop Protocal EH-Tcp

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\EH-Tcp]
"fInheritShadow"=dword:00000000

Disable Intherit Shadow Remote Control For Remote Desktop Protocal RDP-Tcp

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp]
"fInheritShadow"=dword:00000000

Info:

fAutoClientDrives: Connect to client drives upon logon.
fAutoClientLpts: Connect to client printers upon logon.
fEnableWinstation: Enable remote user sessions.
fDisableCam: Disable client audio mapping.
fDisableCcm: Disable client COM port mapping.
fDisableCdm: Disable client drive mapping.
fDisableClip: Disable clipboard mapping.
fDisableCpm: Disable Windows client printer mapping.
fDisableEncryption :Disable encryption.
fDisableExe: Disable program start upon connection.
fDisableLPT: Disable use of printers.
fEnableWinStation: Enable remote user sessions.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\EH-Tcp]
"fAutoClientDrives"=dword:00000000
"fAutoClientLpts"=dword:00000000
"fEnableWinstation"=dword:00000000
"fInheritAutoClient"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fLogonDisabled"=dword:00000001
"fDisableCam"=dword:00000001
"fDisableCcm"=dword:00000001
"fDisableCdm"=dword:00000001
"fDisableClip"=dword:00000001
"fDisableLPT"=dword:00000001
"fDisableCpm"=dword:00000001
"fDisableExe"=dword:00000001
"fInheritInitialProgram"=dword:00000000
"CdDLL"=""
"CfgDll"=""
"PdDLL"=""
"PdDLL1"=""
"WsxDLL"=""
"WdDLL"=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp]
"fAutoClientDrives"=dword:00000000
"fAutoClientLpts"=dword:00000000
"UserAuthentication"=dword:00000001
"fInheritAutoClient"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fLogonDisabled"=dword:00000001
"fDisableCcm"=dword:00000001
"fDisableCdm"=dword:00000001
"fDisableClip"=dword:00000001
"fDisableLPT"=dword:00000001
"fDisableCpm"=dword:00000001
"fDisableExe"=dword:00000001
"fInheritInitialProgram"=dword:00000000
"CdDLL"=""
"CfgDll"=""
"PdDLL"=""
"PdDLL1"=""
"WsxDLL"=""
"WdDLL"=""

USED PCHunter to modify fAcceptConnection under (trusted installer is the only thing that has permissions to change this; PChunter will keep the permissions in tact so you don't have to mess around too much)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\ConnectionHandler]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\ConnectionHandler]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\ConnectionHandler]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Control\Terminal Server\ConnectionHandler]
« Last Edit: March 03, 2018, 05:27:04 AM by dugadugadid »

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Tried updating with march preview, same error; I see other entries like: CBS    SQM: Ignoring upload request because the sample type is not enabled: Standard; what is microsoft trying to upload to what?  "

CBS    SQM: Upload requested for report: PackageChangeEnd_Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, session id: 142862, sample type: Standard
CBS    SQM: Ignoring upload request because the sample type is not enabled: Standard"

"Sample type"? for what?

Microsoft-Windows-SMBMiniRdr, Version = 6.1.7601.24024, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad3
2018-03-03 05:12:09, Info                  CSI    64e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-SMBMiniRdr, Version = 6.1.7601.23915, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-QoS, Version = 6.1.7601.24000, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-QoS, Version = 6.1.7601.17514, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-exFAT, Version = 6.1.7601.23717, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    Microsoft-Windows-exFAT, Version = 6.1.7600.16385, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
2018-03-03 05:12:12, Info                  CSI    000000ff@2018/3/3:12:12:12.487 CSI perf trace:
CSIPERF:TXCOMMIT;199124
CBS    Startup: Primitive operations were successfully rolled back.
CBS    Setting RollbackFailed flag to 1
Error                 CBS    Startup: Rollback failed, startupPhase: 0. [HRESULT = 0x80004005 - E_FAIL]
CBS    Setting ExecuteState key to: CbsExecuteStateFailed
CBS    Doqe: Enabling Device installs
CSI    00000100 Cancelling transactions: [1:[85]"TI4.30651110_520159795:4/Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5"[1]"]"

CSI    00000101 Creating NT transaction (seq 3), objectname [6]"(null)"
CSI    00000102 Created NT transaction (seq 3) result 0x00000000, handle @0x25c
CSI    00000103@2018/3/3:12:12:15.092 CSI perf trace:
CSIPERF:TXCOMMIT;336203
CBS    Clearing HangDetect value
CBS    Saved last global progress. Current: 1, Limit: 1, ExecuteState: CbsExecuteStateFailed
CBS    Doqe: Unlocking driver updates, Count 4
CBS    WER: Generating failure report for package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, status: 0x80004005, failure source: GC, start state: Staged, target state: Installed, client id: WindowsUpdateAgent
CBS    Failed to query DisableWerReporting flag.  Assuming not set... [HRESULT = 0x80070002 - ERROR_FILE_NOT_FOUND]
CBS    Failed to add %windir%\winsxs\pending.xml to WER report because it is missing.  Continuing without it...
CBS    Failed to add %windir%\winsxs\pending.xml.bad to WER report because it is missing.  Continuing without it...
CBS    SQM: Reporting package change completion for package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, current: Installed Invalid, original: Staged, target: Installed, status: 0x80004005, failure source: GC, failure details: "80004005   netsh.exe   1   24   Uninstall (upgrade)   Microsoft-Windows-PeerDist, Culture=neutral, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS   ", client id: WindowsUpdateAgent, initiated offline: False, execution sequence: 1687, first merged sequence: 1687
CBS    SQM: Upload requested for report: PackageChangeEnd_Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, session id: 142862, sample type: Standard



Note: CBS    SQM: Upload requested for report: PackageChangeEnd_Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24058.1.5, session id: 142862, sample type: Standard

session id: 142862

Shadow Remote control configuration. This value becomes effective only if you set the fInheritShadow flag to 0.
0: Deny remote control.
1: Obtain user permission and interact with the session.
2: Do not obtain user permission and interact with the session.
3: Obtain user permission and display session.
4: Do not obtain user permission and display session.

Disable Remote Control of Terminal Server
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration]
"fInheritShadow"=dword:00000000
"Shadow"=dword:00000000
"fInheritAutoLogon"=dword:00000000
"fInheritInitialProgram"=dword:00000000
"fLogonDisabled"=dword:00000001

Could there be a correlation?


or possibly this:

018-03-02 02:43:54, Info                  CBS    SQM: Initializing online with Windows opt-in: False
2018-03-02 02:43:54, Info                  CBS    SQM: Cleaning up report files older than 10 days.
2018-03-02 02:43:54, Info                  CBS    SQM: Requesting upload of all unsent reports.
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start upload with file pattern: C:\Windows\servicing\sqm\*_std.sqm, flags: 0x2 [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Failed to start standard sample upload. [HRESULT = 0x80004005 - E_FAIL]
2018-03-02 02:43:54, Info                  CBS    SQM: Queued 0 file(s) for upload with pattern: C:\Windows\servicing\sqm\*_all.sqm, flags: 0x6
2018-03-02 02:43:54, Info                  CBS    SQM: Warning: Failed to upload all unsent reports. [HRESULT = 0x80004005 - E_FAIL]

with this:

How to stop Microsoft from gathering telemetry data from Windows 7, 8, and 8.1
https://superuser.com/questions/972501/how-to-stop-microsoft-from-gathering-telemetry-data-from-windows-7-8-and-8-1#972506

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Application-Experience/Program-Telemetry]
"Enabled"=dword:00000000
« Last Edit: March 03, 2018, 04:54:01 AM by dugadugadid »

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
I see other entries like: CBS    SQM: Ignoring upload request because the sample type is not enabled: Standard; what is trying to upload what to what?

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
I don't know but it seems to be reported when an update fails from what I've seen.

Have you only had the update problems since changing the status of those items ?

I don't use remote desktop and generally hide any updates for that.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Yes just the drivers and a few remote desktop items; I did install security compliance manager 4.0 ; sql server 2008; i was running into some issues re-installing these programs later; there was some residual sql server data left behind on the machine as they never uninstalled correctly;  Now when I try reinstall it i get this message:

Checking Security Compliance Manager Installation Prerequisite...
Node - DEVICE
ERROR:
Description = Server execution failed
Installing Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319
-------------------

Bits peerdist is the main component not installing properly; That is a component of WMF; so I installed "WMF 5.1 on Windows Server 2008 R2 and Windows 7"  The result executing it normally caused the exact same error on reboot; got to 98% then failed; Then I installed it using the included poweshell script, and it succeeded without an issue! However after this the same error occurred when running the KB4074598  again; Is there any way to install these updates with a powershell script as well?

« Last Edit: March 03, 2018, 11:12:26 AM by dugadugadid »

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
Because of what you have done to the computer, there's no way of knowing what is causing the update to fail.

Generally, any error code ending in a 5 is an Access denied.

A rule of thumb is to create a system image before making major changes.

Do you have any restore points that will take you back to before you uninstalled any of these items ?

I don't know if creating a system image onto external media and then running Windows Repair will do anything for your computer, but it's worth a try.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Unfortunately not; I' suspect I may end up having to do a repair install; that seems to be a common even with this particular error.! But I haven't given up just yet.

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
That's one thing I like about Win 10 - you can perform a repair install without the need of a product key as it is digitally licensed, unlike Win 7.

I tried a repair install on my Toshiba Win 7 laptop but it got almost what seemed to be the end before it failed and reverted back, yet I've seen on here as well as elsewhere where a repair install has succeeded on an OEM machine.

As you don't seem to be getting anywhere fast with this, then perhaps a repair install would be the way to go or if an OEM machine then a factory reset and all that involves, but at least you would know that you once again had a pristine system.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Binance applog is giving me the same error string; 0x80004005 means "permission denied", so whoever was trying to install bits didn't have the permissions to do so. You would need to become "owner" or otherwise have such permissions. You can look at the properties of the directory to determine the owner and the security restrictions on it.

I did run a bunch of commands I had found online to reset trusted installers permissions; im thinking ill do that again;
« Last Edit: March 04, 2018, 02:49:35 PM by dugadugadid »

Offline Boggin

  • Global Moderator
  • Hero Member
  • *****
  • Join Date: Jul 2014
  • Posts: 10123
  • Location: UK
  • Karma: 122
    • View Profile
As I've already said, any error code ending with a 5 is Access Denied which can be caused by a number of things from an antivirus program blocking to file corruption.

Given what you have changed, I think a repair install would be the best option.

Offline dugadugadid

  • Newbie
  • *
  • Join Date: Mar 2018
  • Posts: 29
  • Karma: 0
    • View Profile
Finally solved, 2 months later! After 3 dist upgrades!

So I finally solved this Windows / Update BUG, it and it was as simple as this; set peerdissvc (under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\) (aka branchcache as it is known under services.msc) from disabled back to manual, along with its dependency http, to manual. I'm quite sure setting branchcache to manual was all that was necessary for the fix to take place; I also had set "not configured" to alll changes I had made to "Background Intelligence Transfer Service" under group policy regarding peer caching. I had tried the latter before the last 3 distupgrades and it did not make any difference; so it seems windows update fails if you disable branchcache, which is typically only used by businesses anyway, so many people recommend to disable it, for security reasons also. What a headache; I spent at least a 80 hours, and weeks, and months trying to figure this one out; Windows update has turned into a bunch of bull***** with their ROLLUPS; one error on one of 130 little updates and the whole shebang goes down with the ship; dumbest idea ever for their update platform; they should change to individual updates and do it quick.

This is a MICROSOFT WINDOWS UPDATE BUG. You shouldn't have to enable or disable any built in windows service to get a "windows" update working. What a headache.

SO for all of you 80004005 victims out there; check your C:\Windows\Logs\CBS\cbs.log; search for "error" or "Failed execution" know very well whatever app is failing to install, be it IIS as quoted below-> they disabled IIS and it fixed their problem, or peerdist -> I had to set it from disabled TO manual, so make sure you fiddle with enabling or disabling the failing install service using services.msc or under the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\

Change the entry "start" to demand or auto, or disable if it was already enabled, reboot, then try your update.

0 Boot
1 system
2 Automatic
3 Demand (aka manual)
4 Disabled





Another user claimed the following:

I can also attest that IIS seemed to be the culprit for me.
I disabled the services World Wide Web Publishing Service, IIS Admin Service and some others for good measure, set them all to manual, rebooted, then tried to install SP1 RC Refresh and that finally succeeded.
 I would get certain GUIDs in my CBS.log:

 
Code Block
2008-01-17 12:28:30, Error                 CSI    00000d42 (F) Failed execution of queue item Installer: Task Scheduler ({386b5911-b69e-4d2d-a3ab-796d2ec6af38}) with HRESULT 80041315 [Error,Facility=FACILITY_ITF,Code=4885 (0x1315)].  Failure will not be ignored: A rollback will be initiated after all the operations in the installer queue are completed; installer is reliable (2)[gle=0x80004005]
    Old component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6000.16386, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
    New component: Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral
CSIPERF:AIDONE;{81a34a10-4256-436a-89d6-794b97ca407c};Microsoft-Windows-IIS-HttpErrors, Version = 6.0.6001.17128, pA = PROCESSOR_ARCHITECTURE_INTEL (0), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral;274
2008-01-17 12:28:41, Error                 CSI    00000f12 (F) Done with generic command 110 (0x0000006e); CreateProcess returned 0, CPAW returned S_OK
Url reservation add failed, Error: 6