Update: Based on the comment, disable UAC (User-Account-Control)
...
On the station/server/pc to run psexec.exe:
Giving up a reg query
in the key below return: EnableLUA REG_DWORD 0x1
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" | findstr "EnableLUA"
Rem :: EnableLUA REG_DWORD 0x1
rem :: Então adicione a entrada/valor 0
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
1) I suggest to check in the station of destination, if it exists this key and if it is enabled(0x1):
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system" | find "LocalAccountTokenFilterPolicy" | find "0x1"
If it exists and is enabled, the command returns to you:
LocalAccountTokenFilterPolicy REG_DWORD 0x1
2) If there is no or the value differs from 0x1, use this command to add/enable:
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system" /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
3) Remove the -d argument and add -i -h -s, use password without quotation marks and try with cmd /c copy:
psexec.exe -i -h -s -nobanner -u dominio\administrator -p SENHA "cmd /c copy "\\meu servidor\pasta publica\arquivos\*.vbs" "%PROGRAMFILES(X86)%\OCINV~1\Plugins\""
4) See the documentation:
Note: 1) Option 1 and 2 are for remote access.
Note: 2) I searched online posts on the topic without finding anything that states that copying files via remote action, can operate in destination folders other than between shared folders, there are only a few that suggest creating a bat for this task.
Note: 3) Code has not been tested.
psexec.exe will be barred by (all?) the Antivirus...
– Rui Martins