mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

739
active users

#vbscript

0 posts0 participants0 posts today
InternetDev-Anti-Communicant🍉<p>Pour ceux qui continuent l'ASP</p><p><a href="https://vbsedit.adersoft.com/vo.asp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vbsedit.adersoft.com/vo.asp</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/VBscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBscript</span></a> <a href="https://mastodon.social/tags/ASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASP</span></a> <a href="https://mastodon.social/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a> </p><p>l’Éditeur prend les classes, les fichiers ".inc" , ".vbs", ".js" et une arborescence des membres , variables publiques privées</p>
WinFuture.de<p><a href="https://mastodon.social/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> geht früher in Rente: <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> plant die Deaktivierung der Skriptsprache bereits mit Windows 11 Version 24H2 oder 25H2 - deutlich vor dem ursprünglich angekündigten Ende 2027. <a href="https://winfuture.de/news,150984.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,150984.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
餓鬼<p><span class="h-card"><a href="https://mstdn.jp/@zetamatta" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>zetamatta</span></a></span> <a href="https://mstdn.nere9.help/tags/JUSTSYSTEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JUSTSYSTEM</span></a> <a href="https://mstdn.nere9.help/tags/%E4%B8%80%E5%A4%AA%E9%83%8E" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>一太郎</span></a> は、2006からOpen Document形式の読み書きに対応し、 <a href="https://mstdn.nere9.help/tags/OLE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OLE</span></a> での操作に対応しているようです</p><p>一太郎2020をVBScriptから動かしたメモ <a href="https://mstdn.nere9.help/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> - Qiita <a href="https://qiita.com/qsuke92/items/89b32c7d5b927c0b2930" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">qiita.com/qsuke92/items/89b32c</span><span class="invisible">7d5b927c0b2930</span></a></p><p>一太郎2006 オンラインカタログ:一太郎2006がOpenDocument形式に対応! <a href="https://www.ichitaro.com/2006/opendoc/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">ichitaro.com/2006/opendoc/</span><span class="invisible"></span></a></p>
MrCopilot<p>2024 out here answering IT &amp; Security worker's 35 year old daily prayers:</p><p>" <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> is also removing the scripting language <a href="https://mstdn.social/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> ."</p><p>In the upcoming now optional <a href="https://mstdn.social/tags/Windows11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows11</span></a> 24H2 update.</p>
Redhotcyber<p>VBScript Addio! Microsoft Annuncia la Graduale Eliminazione Entro il 2027</p><p>E’ ora di pulizie in casa <a href="https://mastodon.bida.im/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a>! Dopo <a href="https://mastodon.bida.im/tags/NTLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NTLM</span></a> ora anche <a href="https://mastodon.bida.im/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> si vuole eliminare dall’architettura di <a href="https://mastodon.bida.im/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a>. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/vbscript-addio-microsoft-annuncia-la-graduale-eliminazione-entro-il-2027/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/vbscript-</span><span class="invisible">addio-microsoft-annuncia-la-graduale-eliminazione-entro-il-2027/</span></a></p>
Vladimir Savić<p>Good riddance?!</p><p><a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> to start killing off <a href="https://mastodon.social/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> in second half of 2024 <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-start-killing-off-vbscript-in-second-half-of-2024/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-to-start-killing-off-vbscript-in-second-half-of-2024/</span></a></p>
WinFuture.de<p>Das Ende von <a href="https://mastodon.social/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> hat jetzt endlich auch einen Zeitplan. Schon mit Windows 11 24H2 greift die erste Stufe. <a href="https://winfuture.de/news,142996.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,142996.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Digital Human ✔<p>Het beste nieuwsplatform voor cybersecurity: een onmisbare bron voor professionals <a href="https://www.trendingtech.news/trending-news/2024/05/12872/het-beste-nieuwsplatform-voor-cybersecurity-een-onmisbare-bron-voor-professionals" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/05/12872/het-beste-nieuwsplatform-voor-cybersecurity-een-onmisbare-bron-voor-professionals</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/datalekken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datalekken</span></a> <a href="https://mastodon.social/tags/cyberaanvallen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberaanvallen</span></a> <a href="https://mastodon.social/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> <a href="https://mastodon.social/tags/webinars" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webinars</span></a> <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nieuws</span></a></p>
Freemind<p>Microsoft clarified that VBScript is becoming obsolete, so in future versions of Windows, VBScript will be available as an on-demand feature to ensure uninterrupted use in preparation for VBScript’s retirement.</p><p><a href="https://mastodon.online/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.online/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> </p><p><a href="https://cybersec84.wordpress.com/2023/10/15/vbscript-to-be-deprecated-what-developers-need-to-know/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2023/</span><span class="invisible">10/15/vbscript-to-be-deprecated-what-developers-need-to-know/</span></a></p>
24😷-185<p>Stolen from Reddit: use these <a href="https://piaille.fr/tags/Powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Powershell</span></a> commands for KMS things instead of <a href="https://piaille.fr/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> </p><p>Install-Module slmgr-ps<br>Start-WindowsActivation -WhatIf<br># Activates the local computer<br>Start-WindowsActivation -Verbose<br># Activates the computer named WS01<br>Start-WindowsActivation -Computer WS01<br># Activates the computer named WS01 against server.domain.net:2500<br>Start-WindowsActivation -Computer WS01 -KMSServerFQDN server.domain.net -KMSServerPort 2500</p>
Edoardo Dusi<p>Buongiorno da Thierry Breton della <span class="h-card"><a href="https://social.network.europa.eu/@EU_Commission" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>EU_Commission</span></a></span> che ha scritto una lettera a Elon Musk riguardo i contenuti del tutto o parzialmente falsi che circolano su X in merito al conflitto in Israele e Palestina, in base alle regole del <a href="https://continuousdelivery.social/tags/DSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DSA</span></a>.</p><p>E poi Microsoft ritira VBScript, e RISC-V International risponde alle proposte americane di bloccare la circolazione degli open standard.</p><p><a href="https://continuousdelivery.social/tags/eu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eu</span></a> <a href="https://continuousdelivery.social/tags/elonmusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elonmusk</span></a> <a href="https://continuousdelivery.social/tags/twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twitter</span></a> <a href="https://continuousdelivery.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://continuousdelivery.social/tags/vbscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vbscript</span></a> <a href="https://continuousdelivery.social/tags/riscv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>riscv</span></a> </p><p><a href="https://youtu.be/sVGuDvALSes" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/sVGuDvALSes</span><span class="invisible"></span></a></p>
WinFuture.de<p>Das nächste alte Feature fliegt demnächst aus Windows raus: <a href="https://mastodon.social/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> ist jetzt auf der Deprecated-Liste gelandet. Nutz irgendwer dies noch? <a href="https://winfuture.de/news,138942.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,138942.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
层叠 - The Cascading<p><span>微软宣布,VBScript 将被废弃,并在将来的 Windows 版本中成为可选功能直至被移除。<br><br></span><a href="https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features" rel="nofollow noopener noreferrer" target="_blank"><span>https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features</span></a><span><br><br></span><a href="https://misskey.io/tags/Windows" rel="nofollow noopener noreferrer" target="_blank">#Windows</a><span> </span><a href="https://misskey.io/tags/VBScript" rel="nofollow noopener noreferrer" target="_blank">#VBScript</a><span><br><br></span><a href="https://t.me/outvivid/4340" rel="nofollow noopener noreferrer" target="_blank"><span>Telegram 原文</span></a></p>
Sid (谷思谛) 🐺<p><a href="https://chaos.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> wants to remove <a href="https://chaos.social/tags/vbscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vbscript</span></a> <a href="https://www.bleepingcomputer.com/news/security/microsoft-to-kill-off-vbscript-in-windows-to-block-malware-delivery/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-to-kill-off-vbscript-in-windows-to-block-malware-delivery/</span></a> but what will happen to slmgr.vbs? 🤔</p>
Zeljka Zorz<p>Microsoft has released 103 patches and has fixed actively exploited vulnerabilities in WordPad, Skype for Business, and the HTTP/2 protocol. </p><p>The company also announced today its plan for VBScript deprecation.</p><p><a href="https://www.helpnetsecurity.com/2023/10/10/cve-2023-36563-cve-2023-41763/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2023/10/10</span><span class="invisible">/cve-2023-36563-cve-2023-41763/</span></a></p><p><a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchTuesday</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p>
kamatahvel🇺🇦<p>An early farewell to my first official <a href="https://noc.social/tags/programmingLanguage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programmingLanguage</span></a> - <a href="https://noc.social/tags/vbscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vbscript</span></a>. It helped me automate ~80% of my job back then and made me curious enough to explore more languages soon after. I always feel like the early advice I read to turn on strict type enforcement really helped establish a great foundation for procedural thinking. </p><p><a href="https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features-resources" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">learn.microsoft.com/en-us/wind</span><span class="invisible">ows/whats-new/deprecated-features-resources</span></a></p>
Bmixed<p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/vbscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vbscript</span></a> <br>Microsoft to kill off VBScript in Windows to block malware delivery<br><a href="https://www.bleepingcomputer.com/news/security/microsoft-to-kill-off-vbscript-in-windows-to-block-malware-delivery/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-to-kill-off-vbscript-in-windows-to-block-malware-delivery/</span></a></p>
MrPowerShell<p>Hey <a href="https://fosstodon.org/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> People, did you hear?</p><p><a href="https://fosstodon.org/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> is dead. Long live <a href="https://fosstodon.org/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a>!</p><p><a href="https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features#deprecated-features" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">learn.microsoft.com/en-us/wind</span><span class="invisible">ows/whats-new/deprecated-features#deprecated-features</span></a></p>
Paul O'Malley<p>🚀 Excited to share this time-saving Excel tip with you! Ever been annoyed at needing to manually resize cells to match your text? I know I have been!</p><p>In today's tutorial, I walk you through different ways to resize cells in Excel efficiently.</p><p>We'll start with the ways most people do it manually, then move along to the keyboard shortcut lover's version to save some time. Then I will introduce you to a simple VB Script to automate the whole thing! And I even include a sneaky bonus Excel tip in the video as well that most people don't know about. ⭐️ 🤯</p><p>And don't worry, using the VB Script isn't complex, and I even include a full copy of it in the description of the video so you can easily copy and paste it in yourself!</p><p>🎥 <a href="https://youtu.be/zzLHxT7UT-8" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/zzLHxT7UT-8</span><span class="invisible"></span></a> ⭐️</p><p><a href="https://c.im/tags/ExcelTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExcelTips</span></a> <a href="https://c.im/tags/ProductivityHacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProductivityHacks</span></a> <a href="https://c.im/tags/Spreadsheets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spreadsheets</span></a> <a href="https://c.im/tags/LearnExcel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LearnExcel</span></a> <a href="https://c.im/tags/KeyboardShortcuts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyboardShortcuts</span></a> <a href="https://c.im/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a> <a href="https://c.im/tags/Automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Automation</span></a> <a href="https://c.im/tags/YouTube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YouTube</span></a> <a href="https://c.im/tags/FediTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediTips</span></a> <a href="https://c.im/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a></p>
Sophos X-Ops<p>Here's a tiny slice of what was on the other end of that extremely weird PowerShell command line.</p><p>It's a Visual Basic Script (aka <a href="https://infosec.exchange/tags/VBScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBScript</span></a>) that is chock-full of obfuscatory badness. Long, word-salad variable names; Giant blocks of encoded data broken into dozens of smaller chunks, with a script to concatenate them back into a big data blob, convert them, and deploy. This is the main <a href="https://infosec.exchange/tags/GuLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GuLoader</span></a> infector. </p><p>We go into a lot more detail of how it works in the blog, but the tl;dr is that this script contains the <a href="https://infosec.exchange/tags/Remcos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Remcos</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> payload, part of which it inserts into the Windows Registry in an encoded form. It then sets up a Scheduled Task to invoke a command that retrieves the Registry data, decode it, and then reflectively inject it into legitimate processes, so the malware is never written to the file system of the infected machine. </p><p><a href="https://infosec.exchange/tags/maltax" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maltax</span></a> </p><p>7/</p>