This document discusses malware samples that abuse PowerShell on Windows systems. It provides examples of malware behaviors like generating batch files to execute PowerShell scripts, downloading data from command and control servers, dumping browser cookies, checking for sandbox detection, and downloading/executing files. The document concludes that PowerShell is commonly used by malware in a similar way that AutoIt is abused, and that the focus should be on malicious behaviors rather than the scripting language itself.