Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
64bda120cb447e0c03f451190022a57b
Sha1
3293b81c0e7e0d18b3da0bafa893a108addf60c4
Sha256
d0f5e98fb840fb5656d3f50613b6f1ec60e57392643159841bc1fa95396087a4
Sha384
7ca20cf413c131022401b6fa01eb72635e6afd4d8f07a49208a1800306546f1eb1019843c3175132ad2d55647438ad28
Sha512
41edcf49b18a05eb996d5d49d386e4b8c83a5b777016892230fb3e763281e1f582da0605917f0d20bd066e4e139c18e0048d4aeadf4064c77c0fbcdadd8cf7f4
SSDeep
196608:Z8GMQtdn/62RNOIDEihn+nX6oWxfON6RHwrMe:ZWWR62RNO+Ei9kX6oWxfq0Qr
TLSH
3086235C314B9272D3A613F1A966F1885D3AFC2035B48469B786F97C17BBE90F334922
File Structure
Root Entry
Malicious
䡀䆒䑲
䡀䌏䈯
䡀㲞䈝䗻
䡀䈖䌧䠤
䡀䌋䄱䜵
䡀䌍䏤䊲
䡀㬿䏲䐸䖱
䡀㽿䅤䈯䠶
䡀䈏䗤䕸䠨
䡀䈛䌪䗶䜵
䡀䋜䕲䆷䗸
䡀䒌䗱䒵䠯
䡀䓞䕪䇤䠨
䡀䕙䓲䕨䜷
䡀䈝䗻䗜䏼䠨
䡀䌍䈵䗦䕲䠼
䡀䒌䓰䑲䑨䠷
䡀㼿䕷䑬㭪䗤䠤
䡀㼿䕷䑬㹪䒲䠯
䡀㿿䏤䇬䗤䒬䠱
䡀䄛䌧㫲䗸䒷䠱
䡀䒌䗱䒵㮯䈹䗱
䡀䕌䄨䈷䒏䇯䕨
䡀䖖㪬䖶䐨䏥䠼
䡀䖖㯬䏬㱨䖤䠫
䡀䘌䗶䐲䆊䌷䑲
䡀䙎䑨㶷䓤䌳䊱
䌋䄱䜵㾾㯳䇯㫵䑷
䌋䄱䜵㿾㭜㮗㬝㰏
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
RT_STRING
ID:0007
ID:1033
RT_VERSION
ID:0001
ID:1033
䌋䄱䜵㷾䚨䏏䕧䗋䠱
䡀䇊䌰㾱㼒䔨䈸䆱䠨
䡀䒌䗱䒵㬯䑲䌧䌷䑲
䡀䖖㪬䖶䐨䏥㷼䐤䠨
[PowerShell Command].deobfuscated.vbs
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
[Deobfuscated PS]
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command].deobfuscated.vbs
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
䌋䄱䜵㶾㼼䕦䓬䞷䅹䠶.deobfuscated.vbs
Malicious
䡀䈏䗤䕸㬨䐲䒳䈱䗱䠶
䡀䑒䗶䏤㾯㼒䔨䈸䆱䠨
䌋䄱䜵㭾䉨䄋䑱䕨䌋䐷䓤
䡀㿿䇶䄕䑸䋦䒌䇱䗬䒬䠱
䡀䇊䌰㮱䈻䘦䈷䈜䘴䑨䈦
䡀䇊䗹䛎䆨䗸㼨䔨䈸䆱䠨
䌋䄱䜵㼾䗨䈗䗻䌍䏤䊲䙾䖥
Malicious
䡀䑒䗶䏤㮯䈻䘦䈷䈜䘴䑨䈦
䌋䄱䜵㼾䗨䌙㻳䊨䖬䕷㿼䏤䈸䙾䖥
Malicious
䆒䑲䟾㥈㯃㧆㥍㤅㠏㤅㩄㣄㮀㮇䈾䈻
DigitalSignature
[Authenticode]_3fc8f8fb.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
[Authenticode]_86d02839.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
_184DAAB7EC3C4E87A4D096A81483192A
_1D121053C0CE46619C570BAEEDE16BB7
_241F8550D7313F5D730D44098604B6A7
_3EE9D044C075425C81DD7E5BDED97740
_44822355868347C6B0AB7335858B9B1B
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
[Authenticode]_8f789375.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
FxResources.System.Memory.SR.resources
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
[Authenticode]_ae030d4d.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
FxResources.System.Numerics.Vectors.SR.resources
[Authenticode]_ad6dffb6.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
[Authenticode]_5366eba8.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
[Authenticode]_91abd80f.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
FxResources.System.Diagnostics.DiagnosticSource.SR.resources
ILLink.Substitutions.xml
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
[Authenticode]_8c38879e.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
FxResources.System.Buffers.SR.resources
[Authenticode]_f330f522.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
IBC
ID:0000
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
System.Net.Http.SR.resources
_B1BD15A321D1FE08B7E48632FE5F8187
_B694B19E91F1480AA61E7D92A0AE2E58
[Authenticode]_90e8fbe4.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
[Authenticode]_643cbc10.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
RVTools.AboutBox.resources
$this.Icon
RVTools.FMain.resources
DatastoreToolStripMenuItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
StatusServer.Image
[NBF]root.Data
[NBF]root.Data-preview.png
StatusUsername.Image
[NBF]root.Data
[NBF]root.Data-preview.png
StatusVCFullname.Image
[NBF]root.Data
[NBF]root.Data-preview.png
aboutToolStripMenuItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
exitToolStripMenuItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
RVTools.FPreferences.resources
RVTools.FWait.resources
$this.Icon
[NBF]root.IconData
RVTools.Properties.Resources.resources
Acrobat
[NBF]root.Data
[NBF]root.Data-preview.png
AdobePDF
[NBF]root.Data
[NBF]root.Data-preview.png
Health_Check
[NBF]root.Data
[NBF]root.Data-preview.png
Health_Properties
[NBF]root.Data
[NBF]root.Data-preview.png
Portgroup
[NBF]root.Data
[NBF]root.Data-preview.png
Preferences
[NBF]root.Data
[NBF]root.Data-preview.png
application_go
[NBF]root.Data
[NBF]root.Data-preview.png
arrow_refresh
[NBF]root.Data
[NBF]root.Data-preview.png
cluster
[NBF]root.Data
[NBF]root.Data-preview.png
console
[NBF]root.Data
[NBF]root.Data-preview.png
csv
[NBF]root.Data
[NBF]root.Data-preview.png
drive
[NBF]root.Data
[NBF]root.Data-preview.png
drive_magnify
[NBF]root.Data
[NBF]root.Data-preview.png
email
[NBF]root.Data
[NBF]root.Data-preview.png
excel
[NBF]root.Data
[NBF]root.Data-preview.png
export
[NBF]root.Data
[NBF]root.Data-preview.png
filter
[NBF]root.Data
[NBF]root.Data-preview.png
license
[NBF]root.Data
[NBF]root.Data-preview.png
memory
partition
[NBF]root.Data
[NBF]root.Data-preview.png
partition1
[NBF]root.Data
[NBF]root.Data-preview.png
proc
resourcePool
[NBF]root.Data
[NBF]root.Data-preview.png
rvtools_16x16pxpng
[NBF]root.Data
[NBF]root.Data-preview.png
rvtools_32x32px
[NBF]root.Data
[NBF]root.Data-preview.png
rvtools_64x64
[NBF]root.Data
[NBF]root.Data-preview.png
server_link
[NBF]root.Data
[NBF]root.Data-preview.png
snapshot
[NBF]root.Data
[NBF]root.Data-preview.png
twitter
[NBF]root.Data
[NBF]root.Data-preview.png
vCD
[NBF]root.Data
[NBF]root.Data-preview.png
vCPU
[NBF]root.Data
[NBF]root.Data-preview.png
vDatastore
[NBF]root.Data
vHost
vInfo
vMemory
[NBF]root.Data
[NBF]root.Data-preview.png
vNic
[NBF]root.Data
[NBF]root.Data-preview.png
vSwitch
[NBF]root.Data
[NBF]root.Data-preview.png
vTools
[NBF]root.Data
[NBF]root.Data-preview.png
vUSB1
[NBF]root.Data
[NBF]root.Data-preview.png
world_go
[NBF]root.Data
[NBF]root.Data-preview.png
x-logo-black
[NBF]root.Data
[NBF]root.Data-preview.png
_D0CDE47E90F54893845E85E70312E181
[Authenticode]_17262b02.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_507d4455.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
DocumentFormat.OpenXml.Resources.ExceptionMessages.resources
DocumentFormat.OpenXml.Validation.ValidationResources.resources
[Authenticode]_0a79d4d6.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
_E107A392B92B481CA766BF48D2548406
_EC8BD2B2343E8DC25C77455CCFAFE1DF
_F14A379D2D214949AE2A09418C1C5012
Text (Preview)
#Stream {7777}
#Stream {7781}
#Stream {7785}
#Stream {18}
#Stream {17}
#Stream {5}
#Stream {7788}
#Stream {7790}
#Stream {7780}
#Stream {282}
#Stream {289}
#Stream {288}
#Stream {312}
#Stream {311}
#Stream {317}
#Stream {316}
#Stream {322}
#Stream {321}
#Stream {338}
#Stream {337}
#Stream {342}
#Stream {341}
#Stream {349}
#Stream {348}
#Stream {353}
#Stream {352}
#Stream {357}
#Stream {356}
#Stream {7798}
#Stream {361}
#Stream {360}
#Stream {7792}
#Stream {7791}
#Stream {374}
#Stream {373}
#Stream {377}
#Stream {378}
#Stream {376}
#Stream {386}
#Stream {385}
#Stream {392}
#Stream {391}
#Stream {400}
#Stream {399}
#Stream {403}
#Stream {402}
#Stream {406}
#Stream {405}
#Stream {410}
#Stream {409}
#Stream {414}
#Stream {413}
#Stream {419}
#Stream {418}
#Stream {425}
#Stream {424}
#Stream {428}
#Stream {427}
#Stream {432}
#Stream {431}
#Stream {436}
#Stream {435}
#Stream {438}
#Stream {437}
#Stream {440}
#Stream {439}
#Stream {7797}
#Stream {7809}
#Stream {441}
#Stream {451}
#Stream {454}
#Stream {453}
#Stream {455}
#Stream {20}
#Stream {7811}
#Stream {7810}
#Stream {456}
#Stream {466}
#Stream {464}
#Stream {472}
#Stream {7776}
#Stream {479}
#Stream {473}
#Stream {7805}
#Stream {7804}
#Stream {493}
#Stream {499}
#Stream {501}
#Stream {7816}
#Stream {505}
#Stream {7818}
#Stream {506}
#Stream {509}
#Stream {510}
#Stream {514}
#Stream {516}
#Stream {517}
#Stream {520}
#Stream {164}
#Stream {522}
#Stream {523}
#Stream {524}
#Stream {525}
#Stream {526}
#Stream {527}
#Stream {528}
#Stream {529}
#Stream {530}
#Stream {7821}
#Stream {7820}
#Stream {531}
#Stream {220}
#Stream {537}
#Stream {540}
#Stream {539}
#Stream {541}
#Stream {542}
#Stream {266}
#Stream {290}
#Stream {7796}
#Stream {298}
#Stream {301}
#Stream {302}
#Stream {304}
#Stream {303}
#Stream {305}
#Stream {306}
#Stream {308}
#Stream {307}
#Stream {309}
#Stream {310}
#Stream {313}
#Stream {314}
#Stream {315}
#Stream {318}
#Stream {319}
#Stream {320}
#Stream {324}
#Stream {325}
#Stream {323}
#Stream {7802}
#Stream {7801}
#Stream {326}
#Stream {335}
#Stream {336}
#Stream {339}
#Stream {340}
#Stream {343}
#Stream {346}
#Stream {347}
#Stream {350}
#Stream {351}
#Stream {354}
#Stream {355}
#Stream {358}
#Stream {359}
#Stream {362}
#Stream {365}
#Stream {366}
#Stream {367}
#Stream {370}
#Stream {371}
#Stream {369}
#Stream {372}
#Stream {375}
#Stream {379}
#Stream {380}
#Stream {381}
#Stream {382}
#Stream {383}
#Stream {384}
#Stream {387}
#Stream {388}
#Stream {389}
#Stream {390}
#Stream {393}
#Stream {394}
#Stream {395}
#Stream {396}
#Stream {397}
#Stream {398}
#Stream {401}
#Stream {404}
#Stream {407}
#Stream {408}
#Stream {411}
#Stream {412}
#Stream {415}
#Stream {416}
#Stream {417}
#Stream {420}
#Stream {421}
#Stream {422}
#Stream {423}
#Stream {426}
#Stream {429}
#Stream {430}
#Stream {433}
#Stream {434}
#Stream {468}
#Stream {469}
#Stream {470}
#Stream {471}
#Stream {467}
#Stream {7814}
#Stream {485}
#Stream {480}
#Stream {488}
#Stream {486}
#Stream {490}
#Stream {500}
#Stream {502}
#Stream {521}
#Stream {7823}
Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
SummaryInformation
MsiDigitalSignatureEx
_044B82E6289DC5A2E35D8BA1B9F4210E
_05D5AA7E4350E1771088ABE5F0EC4DAC
_1354D0E01EAE18DFE051CB0A6152BE04
_184DAAB7EC3C4E87A4D096A81483192A
_1D121053C0CE46619C570BAEEDE16BB7
_241F8550D7313F5D730D44098604B6A7
_3EE9D044C075425C81DD7E5BDED97740
_44822355868347C6B0AB7335858B9B1B
_4ECC8554055CA579195AC72D6E4A4A6E
_755F63359A7FED3673062D4BE4EEEB1F
_7700C3DD020B3E866398FFC19B74DC85
_81D57EF6096CA277B68DFD7853430352
_8481DC9D8740A372971A875A6D7F1FB3
_88AB4E9C9EAA8AB48E134688D2A5F218
_916A3D9E2BA6AA273F6979BC42A0B100
_9FA9C0CF533298FB916F01E8C1728E87
_A321378C0723A249C79DAD49CF2290A1
_AE4B52809020252C5AA0CF8FF393625D
_AF2F573613A29B08EAF8D1BBE1ACCD53
_B1BD15A321D1FE08B7E48632FE5F8187
_B694B19E91F1480AA61E7D92A0AE2E58
_B87382FCA5C153702794B52A6D35450F
_C41A35C6A37CD084859E3CB2E70AE9DA
_D0CDE47E90F54893845E85E70312E181
_D71D65078B87897EC309110E3C193843
_D993EAC9652D6B277EC1D3AD9386A898
_DBB36C507EA404A8B6D41FAD5562907B
_E107A392B92B481CA766BF48D2548406
_EC8BD2B2343E8DC25C77455CCFAFE1DF
_F14A379D2D214949AE2A09418C1C5012
_F5E8C90CE968B3FD3385208B479FE43C
_FD9BA260F6E682E262FA42F3C05C6925
Malware Configuration - URLs in PDF
Config. Field
Value
URL #1

http://www.vmware.com/pdf/vi3_35/esx_3/r35u2/vi3_35_25_u2_admin_guide.pdf

URL #2

http://communities.vmware.com/thread/191081

URL #3

http://kb.vmware.com/kb/1007195

URL #4

http://packages.vmware.com/tools/versions

URL #5

https://www.telerik.com/download/fiddler

URL #6

http://logging.apache.org/log4net/

URL #7

https://kb.vmware.com/s/article/57829

Informations
Name
Value
_F14A379D2D214949AE2A09418C1C5012

1.7

_F14A379D2D214949AE2A09418C1C5012

Rob de Veij

_F14A379D2D214949AE2A09418C1C5012

D:20240930143555+01'00'

_F14A379D2D214949AE2A09418C1C5012

Microsoft® Word for Microsoft 365

_F14A379D2D214949AE2A09418C1C5012

D:20240930143555+01'00'

_F14A379D2D214949AE2A09418C1C5012

RVTools 4.7.1 October 3, 2024

_F14A379D2D214949AE2A09418C1C5012

Microsoft® Word for Microsoft 365

_F14A379D2D214949AE2A09418C1C5012

true

_F14A379D2D214949AE2A09418C1C5012

2023-10-13T16:49:30Z

_F14A379D2D214949AE2A09418C1C5012

Privileged

_F14A379D2D214949AE2A09418C1C5012

Public No Visual Label

_F14A379D2D214949AE2A09418C1C5012

945c199a-83a2-4e80-9f8c-5a91be5752dd

_F14A379D2D214949AE2A09418C1C5012

99a04929-6196-4e8e-ba9f-4d322af4fd51

_F14A379D2D214949AE2A09418C1C5012

0

_F14A379D2D214949AE2A09418C1C5012

RVTools 4.7.1 October 3, 2024

_F14A379D2D214949AE2A09418C1C5012

Rob de Veij

_F14A379D2D214949AE2A09418C1C5012

Microsoft® Word for Microsoft 365

_F14A379D2D214949AE2A09418C1C5012

D:20240930143555+01'00'

_F14A379D2D214949AE2A09418C1C5012

D:20240930143555+01'00'

_F14A379D2D214949AE2A09418C1C5012

Microsoft® Word for Microsoft 365

Artefacts
Name
Value
URLs in VB Code - #1

http://go.microsoft.com/fwlink/?LinkId=395269DIRCA_TARGETDIRTARGETDIR=

URLs in VB Code - #2

http://schemas.microsoft.com/office

URLs in VB Code - #3

https://www.robware.net/about

URLs in VB Code - #4

http://www.robware.net/rvtoolsALLUSERSARPPRODUCTICONVSDNETURLMSGThis

URLs in VB Code - #5

http://crl.comodoca.com/AAACertificateServices.crl04

URLs in VB Code - #6

http://ocsp.comodoca.com0

URLs in VB Code - #7

http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0

URLs in VB Code - #8

http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#

URLs in VB Code - #9

http://ocsp.sectigo.com0

URLs in VB Code - #10

https://sectigo.com/CPS0

URLs in VB Code - #11

http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0

URLs in VB Code - #12

http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#

URLs in VB Code - #13

http://ocsp.globalsign.com/gsoffliner45timestampca20250O

URLs in VB Code - #14

http://secure.globalsign.com/cacert/gsoffliner45timestampca2025.crt0J

URLs in VB Code - #15

http://crl.globalsign.com/gsoffliner45timestampca2025.crl0V

URLs in VB Code - #16

https://www.globalsign.com/repository/0

URLs in VB Code - #17

http://ocsp.globalsign.com/timestamprootr450D

URLs in VB Code - #18

http://secure.globalsign.com/cacert/timestamprootr45.crt0

URLs in VB Code - #19

http://crl.globalsign.com/timestamprootr45.crl0

URLs in VB Code - #20

http://ocsp2.globalsign.com/rootr60

URLs in VB Code - #21

http://secure.globalsign.com/cacert/root-r6.crt06

URLs in VB Code - #22

http://crl.globalsign.com/root-r6.crl0G

Deobfuscated PowerShell

pscommand & "" " execute " the "command" "and" "wait" "for" "completion" 0 "=" "Hide" @("window", "True") "=" "Wait" "for" "completion" result "=" "shell.Run" (fullcommand @(0, "True")) " clean " up set "shell" "=" "nothing" "Return" "the" "result" (msi "will" "use" "this" "to" "determine" "success/failure") runmytask "=" "result" end "Function"

Deobfuscated PowerShell

" & pscommand & "" " execute " the "command" "and" "wait" "for" "completion" 0 "=" "Hide" @("window", "True") "=" "Wait" "for" "completion" result "=" "shell.Run" (fullcommand @(0, "True")) " clean " up set "shell" "=" "nothing" "Return" "the" "result" (msi "will" "use" "this" "to" "determine" "success/failure") runmytask "=" "result" end "Function"

URI

http://www.robware.net/

URI

http://www.fulldata.nl/

URI

mailto:Henk@fulldata.nl

URI

mailto:gsizemore@vmware.com

URI

https://blogs.vmware.com/virtualblocks/2020/12/09/storage-units-within-vmware-cloud-on-aws/

URI

https://www.telerik.com/download/fiddler

URI

http://logging.apache.org/log4net/

URI

https://www.robware.net/about

URI

mailto:rvtools@robware.net

URI

mailto:rvtools@dell.com

URI

http://www.vmware.com/pdf/vi3_35/esx_3/r35u2/vi3_35_25_u2_admin_guide.pdf

URI

http://communities.vmware.com/thread/191081

URI

http://kb.vmware.com/kb/1007195

URI

http://packages.vmware.com/tools/versions

Deobfuscated PowerShell

"" pscommand & "" " execute " the command and wait for completion 0 " "= Hide @(window, True) = Wait for completion result = shell.Run (fullcommand @(0, True)) " clean " up set shell = nothing " "Return the result (msi will use this to determine success/failure) runmytask = result end Function"

Deobfuscated PowerShell

with "necessary" "parameters" dim "fullcommand" fullcommand "=" "powershell" -ExecutionPolicy "Bypass" -NoProfile -NoLogo -NonInteractive -WindowStyle "Hidden" -Command "" & pscommand & "" " execute " the "command" "and" "wait" "for" "completion" 0 " " = hide @({ window "True" } ) "=" "Wait" "for" "completion" result "=" "shell.Run" (fullcommand @({ @(0, [Unmanaged(ErrorExpressionAst)] ,) true } )) " clean " up set "shell" "=" "nothing" " " return the "result" (msi "will" "use" "this" "to" "determine" "success/failure") runmytask "=" "result" end "Function"

Deobfuscated PowerShell

with "necessary" "parameters" dim "fullcommand" fullcommand "=" "powershell" -ExecutionPolicy " bypass -noprofile -nologo -noninteractive -windowstyle hidden -command " & pscommand & " execute " the "command" "and" "wait" "for" "completion" 0 " " = hide @({ window "True" } ) "=" "Wait" "for" "completion" result "=" "shell.Run" (fullcommand @({ @(0, [Unmanaged(ErrorExpressionAst)] ,) true } )) " clean " up set "shell" "=" "nothing" " " return the "result" (msi "will" "use" "this" "to" "determine" "success/failure") runmytask "=" "result" end "Function"

Deobfuscated PowerShell

bypass -noprofile -nologo -noninteractive -windowstyle "hidden" -command " & pscommand & " execute " the command and wait for completion 0 " "= Hide @(window, True) = Wait for completion result = shell.Run (fullcommand @(0, True)) " clean " up set shell = nothing " "Return the result (msi will use this to determine success/failure) runmytask = result end Function"

Deobfuscated PowerShell

bypass -noprofile -nologo -noninteractive -windowstyle hidden -command " & pscommand & " execute " the command and wait for completion 0 " "= Hide @(window, True) = Wait for completion result = shell.Run (fullcommand @(0, True)) " clean " up set shell = nothing " "Return the result (msi will use this to determine success/failure) runmytask = result end Function"

64bda120cb447e0c03f451190022a57b (8.33 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙