The script reaches out to a remote Command and Control (C2) server operated by the hackers [1].
Always configure your operating system to show full file extensions so you can spot hidden .exe or .scr files [4]. ImmortalS3E5-HD.mp4
The server delivers the actual malware, which could be a credential stealer, ransomware, or a cryptocurrency miner [1, 3]. The script reaches out to a remote Command