<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi in VMware Fusion Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929193#M179622</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;With the experimental vTPM feature there's not just .vmx lines that need to be removed.&lt;/P&gt;&lt;P&gt;There are other parts that also have been encrypted, like the vmdk descriptor file. The descriptor file is the vmdk file without the -s00nn.vmdk suffix.&lt;/P&gt;&lt;P&gt;If you don't have a backup copy of that one, then you'll have to recreate the descriptor file yourself by creating a dummy virtual disk of exactly the same size.&lt;/P&gt;&lt;P&gt;Then checking the contents of the descriptor file and drawing up one that matches your disk slice names. It should have the exact same amount of slices.&lt;/P&gt;&lt;P&gt;If you ever have resized your virtual disk, then you have to do that also for the dummy disk.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
    <pubDate>Thu, 15 Sep 2022 22:16:19 GMT</pubDate>
    <dc:creator>wila</dc:creator>
    <dc:date>2022-09-15T22:16:19Z</dc:date>
    <item>
      <title>(VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machine??</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2923063#M179338</link>
      <description>&lt;P&gt;I had a hardware failure and had to migrate machines.&amp;nbsp; Booting from the old drive was not an option, but I recovered data including all VMs.&amp;nbsp; However, I discovered to my horror that my Win11 VMs now &lt;A href="https://www.vimalin.com/blog/what-you-should-know-about-vmwares-experimental-vtpm/" target="_self"&gt;prompt me for a password&lt;/A&gt;, claiming to be encrypted.&lt;/P&gt;&lt;P&gt;Destructively removing the vTPM as described in the article or &lt;A href="https://www.reddit.com/r/vmware/comments/qy9wns/virtual_tpm_chip_and_migrating_to_new_machine/" target="_self"&gt;this thread&lt;/A&gt; isn't an option.&amp;nbsp; I need to know: where was the password stored on the old machine?!?!?&lt;/P&gt;&lt;P&gt;It's hard to speak politely, as binding a&amp;nbsp;&lt;EM&gt;virtual machine&lt;/EM&gt;&amp;nbsp;to its host like this is such a phenomenally bad design choice.&amp;nbsp; The WHOLE POINT of software emulation (i.e. managedvm.autoAddVTPM = “software”) is to ABSTRACT the host away, not lock it in.&amp;nbsp; If I wanted actual VM encryption or security, I would've asked for that.&amp;nbsp; I didn't.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 00:22:17 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2923063#M179338</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-08-10T00:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2923077#M179341</link>
      <description>&lt;P&gt;I never used Windows 11 on Fusion 12 (support was rudimentary at best), but looking forward, on the tech preview, the password is now set by the user manually, and optionally stored in the system keychain. &amp;nbsp; I know it doesn't help your current situation, but support is definitely better now.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 04:09:20 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2923077#M179341</guid>
      <dc:creator>ColoradoMarmot</dc:creator>
      <dc:date>2022-08-10T04:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2923176#M179343</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;As you're referring to two links in which I participate as help (I wrote the article at the vimalin site and I am /u/dfguidance at reddit), a few notes.&lt;/P&gt;&lt;P&gt;The data on the disk isn't encrypted so -at least in theory- you should be to get the VM(s?) back to work. The descriptor files describing those virtual disks however are.&lt;/P&gt;&lt;P&gt;How did you configure the virtual disk on the VM you need back?&lt;/P&gt;&lt;P&gt;Note that my article points to a few threads that describe how users recovered their VM. Not destructive, unless you mean it will drop the vTPM itself (yes it will, no way around that AFAIK).&lt;/P&gt;&lt;P&gt;PS: I don't know where the password was saved in the experimental vTPM feature. But even if it was in the keychain then I think it would still be inaccessible and you are still at the same stage unless you saved the keychain in iCloud.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 13:25:45 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2923176#M179343</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-08-10T13:25:45Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929169#M179618</link>
      <description>&lt;P&gt;That sounds like a great improvement over the current situation.&amp;nbsp; I wish they'd help those of us who tried it in v12.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 20:08:08 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929169#M179618</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-09-15T20:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929180#M179620</link>
      <description>&lt;P&gt;I have a backup of the keychains, and the Library folders.&amp;nbsp; So if it was stored anywhere in either, I can retrieve it, and it must be possible somehow.&amp;nbsp; However nothing looks promising.&amp;nbsp; And copying over the Application Support folder was not sufficient.&lt;/P&gt;&lt;P&gt;I believe it was a lazily allocated disk (I see Virtual Disk-s001.vmdk, etc. files).&amp;nbsp; The VM has no snapshots.&amp;nbsp; But there was some data encrypted with the TPM I need back.&lt;/P&gt;&lt;P&gt;However for now, what's a step-by-step procedure for removing the vTPM?&amp;nbsp; I tried removing the VMX lines mentioned in your post, but of course the VM becomes unbootable.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 20:38:16 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929180#M179620</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-09-15T20:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929193#M179622</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;With the experimental vTPM feature there's not just .vmx lines that need to be removed.&lt;/P&gt;&lt;P&gt;There are other parts that also have been encrypted, like the vmdk descriptor file. The descriptor file is the vmdk file without the -s00nn.vmdk suffix.&lt;/P&gt;&lt;P&gt;If you don't have a backup copy of that one, then you'll have to recreate the descriptor file yourself by creating a dummy virtual disk of exactly the same size.&lt;/P&gt;&lt;P&gt;Then checking the contents of the descriptor file and drawing up one that matches your disk slice names. It should have the exact same amount of slices.&lt;/P&gt;&lt;P&gt;If you ever have resized your virtual disk, then you have to do that also for the dummy disk.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 22:16:19 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929193#M179622</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-09-15T22:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929349#M179632</link>
      <description>&lt;P&gt;Is there a way to determine the size &amp;amp; specs?&amp;nbsp; I can't recall the exact details it was created with.&amp;nbsp; tbh I didn't expect VMWare to encrypt my files and throw away the password.&lt;/P&gt;&lt;P&gt;Are there any steps besides deleting the vmx lines and recreating the .vmdk descriptor?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 23:04:02 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929349#M179632</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-09-16T23:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929363#M179634</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The last time I played with this was probably a year ago, so somehow I don't have exact steps.&lt;/P&gt;&lt;P&gt;In order to be able to help we need more details.&lt;/P&gt;&lt;P&gt;1. a full file list of your VM. (eg. ls -al /foldername/of/vm &amp;gt; ~/Desktop/vm-filelist.txt )&lt;/P&gt;&lt;P&gt;2. a copy of the following files: the .vmx, vmsd, all vmdk files smaller than 4kB&lt;/P&gt;&lt;P&gt;3. all vmware.log files&lt;/P&gt;&lt;P&gt;In order to be able to attach those files to a reply down here, you need to zip/compress them.&lt;/P&gt;&lt;P&gt;An answer to the following questions:&lt;/P&gt;&lt;P&gt;Do you remember when you created this VM? Was this before VMware Fusion 7 or after?&lt;/P&gt;&lt;P&gt;Did you ever increase the size of the virtual disk?&lt;/P&gt;&lt;P&gt;I might have more questions after that.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 09:13:15 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929363#M179634</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-09-17T09:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929406#M179639</link>
      <description>&lt;P&gt;It was created with Fusion 12, around 6/2/22, and the vTPM was added right after it was created to enable installing Windows 11. I never increased the size.&lt;/P&gt;&lt;P&gt;Here's the file list:&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;..&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;.DS_Store&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s001.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s002.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s003.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s004.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s005.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s006.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s007.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s008.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s009.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s010.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s011.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s012.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s013.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s014.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s015.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s016.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk-s017.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Virtual Disk.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11-cfd9a924.vmem&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11-cfd9a924.vmss&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11.nvram&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11.plist&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11.vmsd&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11.vmx&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11.vmx.old&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Win11.vmxf&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;appListCache&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;caches&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;mksSandbox-0.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;mksSandbox-1.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;mksSandbox-2.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;mksSandbox.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;startMenu.plist&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vm-10.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vm-11.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vm-9.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vm.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vmware-0.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vmware-1.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vmware-2.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;vmware.log&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;Working on the files… is the vTPM password / encryption key in the log anywhere?&amp;nbsp; Or the location it's loaded from?&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 22:29:51 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929406#M179639</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-09-17T22:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929410#M179640</link>
      <description>&lt;P&gt;That file list has no details on size &amp;amp; date.. as such that's not the output of "ls -al"&lt;/P&gt;&lt;P&gt;There are no details about the vTPM password in the log AFAIK, if it would be there than that would be a massive goof up.&lt;/P&gt;&lt;P&gt;I'm asking for those files to get an idea about the correct size of your disk.. nothing more.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 22:55:12 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929410#M179640</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-09-17T22:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929411#M179641</link>
      <description>&lt;P&gt;FWIW.. you can try the following for creating the virtual disk.vmdk descriptor file as I will be off to bed.&lt;/P&gt;&lt;P&gt;Step 1) Make a backup of the folder of the VM as you're experimenting and you don't want to loose more.&lt;/P&gt;&lt;P&gt;After that (and only after you have that backup) try the following experiment.&lt;/P&gt;&lt;P&gt;Create a new dummy VM with a disk of 68GB, also with a split disk scheme of course. So the file list of that new VM will look similar as what you have here.&lt;/P&gt;&lt;P&gt;Then replace the file "virtual Disk.vmdk" from your copy with the copy of the new dummy VM.&lt;/P&gt;&lt;P&gt;Also remove the lines from the vmx we talked about earlier.&lt;/P&gt;&lt;P&gt;Throw away (or if you want -rename) the .nvram and .vmxf files.&lt;/P&gt;&lt;P&gt;Boot the vm and see if it complains.&lt;/P&gt;&lt;P&gt;If that doesn't work.. then tell us the errors and attach the files I asked for.. get them from the backup please, not the experiment.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 23:42:36 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929411#M179641</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-09-17T23:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929462#M179645</link>
      <description>&lt;P&gt;Ah sorry, I wasn't sure how much detail you needed.&amp;nbsp; Here's ls -aln&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;total 34982920&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drwxrwxrwx&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;44 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;1408 Sep 17 14:13 &lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;224 May 23 15:58 &lt;/SPAN&gt;&lt;SPAN class=""&gt;..&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rw-r--r--@&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;6148 Jul 21 20:00 .DS_Store&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;4152950784 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:09 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s001.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;4254924800 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:09 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s002.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3077308416 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:09 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s003.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3811180544 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:09 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s004.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:02 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s005.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:02 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s006.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:02 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s007.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;327680 May 23 16:02 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s008.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s009.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s010.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s011.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s012.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s013.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s014.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s015.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;524288 May 23 16:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s016.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;586088448 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 14:21 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk-s017.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;1527 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 14:11 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Disk.vmdk&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2015748096 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:10 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11-cfd9a924.vmem&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;3969024 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:10 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11-cfd9a924.vmss&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;294912 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:09 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11.nvram&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;863 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2 16:28 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11.plist&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;371 May 23 16:26 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11.vmsd&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;10396 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:10 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11.vmx&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxr-xr-x &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;10396 Jul 27 14:37 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11.vmx.old&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;4257 May 23 16:54 &lt;/SPAN&gt;&lt;SPAN class=""&gt;Win11.vmxf&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;224 May 23 16:50 &lt;/SPAN&gt;&lt;SPAN class=""&gt;appListCache&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;96 May 23 16:13 &lt;/SPAN&gt;&lt;SPAN class=""&gt;caches&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;89905 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;6 17:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;mksSandbox-0.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;89925 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3 14:50 &lt;/SPAN&gt;&lt;SPAN class=""&gt;mksSandbox-1.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;93088 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2 18:41 &lt;/SPAN&gt;&lt;SPAN class=""&gt;mksSandbox-2.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;89771 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:10 &lt;/SPAN&gt;&lt;SPAN class=""&gt;mksSandbox.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;554869 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:10 &lt;/SPAN&gt;&lt;SPAN class=""&gt;startMenu.plist&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8192 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3 11:48 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vm-10.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8192 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;6 14:11 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vm-11.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8192 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2 13:52 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vm-9.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8192 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 14:11 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vm.scoreboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;331931 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;6 17:27 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vmware-0.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;372589 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3 14:50 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vmware-1.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;657037 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2 18:41 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vmware-2.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-rwxrwxrwx &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1 501&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;315788 Jun&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7 15:10 &lt;/SPAN&gt;&lt;SPAN class=""&gt;vmware.log&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI-SPOILER&gt;</description>
      <pubDate>Sun, 18 Sep 2022 20:40:17 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929462#M179645</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-09-18T20:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929476#M179646</link>
      <description>&lt;P&gt;Without more details I'll stick to my guess of a 68GB sized virtual disk.&lt;/P&gt;&lt;P&gt;edit:&lt;/P&gt;&lt;P&gt;Let me explain the reasoning. There's 17 disk slices and you're using a VMware Fusion later than Fusion 7.&lt;BR /&gt;Because of that I already know the disk is under 128GB. As the disk is under 128GB each slice can only take up 4GB. The rules change once a disk is over 128GB, in that case a disk slice might be bigger, but that is not the case here.&lt;BR /&gt;17*4=68. So that is the absolute maximum size your virtual disk could be.&lt;BR /&gt;&lt;BR /&gt;Now that last slice might be less than 4GB in size.&lt;/P&gt;&lt;P&gt;So your disk will be between 64GB and 68GB. Normally you'd type in a round number when creating a virtual disk (that's not a must)&lt;BR /&gt;A hint for the real size might be in one of the logs, but as I don't have the logs.. your guess will be as good as mine.&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Sun, 18 Sep 2022 23:34:07 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929476#M179646</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-09-18T23:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929607#M179657</link>
      <description>&lt;P&gt;Okay I can try 68GB, but I would've thought it would be 64GB.&amp;nbsp; Here are the logs btw.&lt;/P&gt;&lt;P&gt;Is there any indication in them as to where the password/key is loaded from?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2022 17:25:28 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929607#M179657</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-09-19T17:25:28Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929632#M179663</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I just played a bit with a few dummy VMs.&lt;/P&gt;&lt;P&gt;If you keep the default of 60GB then it creates 16 disk slices.&lt;BR /&gt;if you use the 60 GB as default and then resize the disk to 64GB before booting, you already get 18 disk slices.&lt;BR /&gt;However if you delete the 60GB disk.. then add back a new disk at 64GB.. it is indeed 17 disk slices.&lt;/P&gt;&lt;P&gt;The log file is useful as it has this line:&lt;/P&gt;&lt;PRE&gt;2022-06-07T19:11:10.310Z In(05) vmx DISK: OPEN '/Users/alex/Virtual Machines.localized/Win11.vmwarevm/Virtual Disk.vmdk' Geo (8354/255/63) BIOS Geo (0/0/0)&lt;/PRE&gt;&lt;P&gt;The geometrics there tell me the size of the disk.&lt;/P&gt;&lt;P&gt;When looking at the 64GB disk I just created, then it has the following lines in the descriptor file:&lt;/P&gt;&lt;PRE&gt;ddb.geometry.cylinders = "8354"&lt;BR /&gt;ddb.geometry.heads = "255"&lt;BR /&gt;ddb.geometry.sectors = "63"&lt;/PRE&gt;&lt;P&gt;Looks like that matched!&lt;/P&gt;&lt;P&gt;I'll attach the descriptor file for you so you can use that.&lt;/P&gt;&lt;P&gt;With a tiny bit of luck it is what was needed.&lt;/P&gt;&lt;P&gt;Then you'll only have to take care of the .vmx (&amp;amp; remove the other files I mentioned)&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2022 21:59:04 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2929632#M179663</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-09-19T21:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: (VM Fusion 12.2) Where was the password stored to decrypt VM with vTPM after moving to new machi</title>
      <link>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2944012#M180914</link>
      <description>&lt;P&gt;When I try this, I get the error "Dictionary problem" and nothing happens.&lt;/P&gt;&lt;P&gt;It may be worth noting that the VM is still called "Locked" in VMWare Fusion, and has a lock icon.&lt;/P&gt;&lt;P&gt;Edit: it appears this was caused by missing the dummy VM.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2022 02:46:40 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Fusion-Discussions/VM-Fusion-12-2-Where-was-the-password-stored-to-decrypt-VM-with/m-p/2944012#M180914</guid>
      <dc:creator>alexchandel</dc:creator>
      <dc:date>2022-12-15T02:46:40Z</dc:date>
    </item>
  </channel>
</rss>

