That file appears to be an Alternate Data Stream (ADS) characteristic of the ZeroAccess Rootkit.
If the file is located in C:\WINDOWS, let's take care of it:
It throws a wrench in the works, and programs will not run successfully...
Please download DummyCreator.zip:
Unzip the folder:
Right-click and select: Extract all
Follow the prompts to extract
Open the new folder that appears on the Desktop:
Double-click 'DummyCreator/DummyMaker' to run the tool.
Now, copy/paste the following into the blank area:
Press the 'Create' button.
Save the content of the 'Result.txt' to your Desktop, and post it in your reply.
Next, restart the computer!
This utility moves the malware ADS file and makes a locked dummy folder for it.
Please do not run any malware removal programs yet.
Doing so may just make matters worse!
Retired - Doin' Dis, Dat, and slapping malware.
Malware Eliminator/Member of UNITE and the
Alliance of Security Analysis Professionals