Sure looks like Malware. Cmd.exe cannot function as a true service as it does not have the needed entry points. And the script is loading a web address from file, downloading something (more powershell commands) and executing them.
I would start by alerting your manager and your security team that you have encountered some suspicious activity.
I did a search on in6.ps1 and in3.ps1 and came across these. (This site may not like these links, change xx to tt.)
hxxps://asec.ahnlab.com/en/16564/
hxxps://www.cybereason.com/blog/research/wannamine-cryptominer-eternalblue-wannacry
Your security team may want to do an analysis of what that code did (or might do). You should try to figure out if the infection has spread or if any of your data was stolen/compromised. That would require you to download the actual malware payload and evaluate the code.
Also note the "2. Registering WMI Event Filter" in the first link. The malware may have hidden itself within WMI. Check other machines on your network to see if they also have those odd service names.
Start by opening a Powershell window with "run as administrator" and search for those files. They are probably in System32, but you want to scan the entire drive to see if they are anywhere else.
Get-ChildItem -Path c:\ -force -include in6.ps1,in3.ps1 -recurse -ea SilentlyContinue | ft -Property CreationTime, LastWriteTime, FullName
That might give you a date and time as to when your server was initially infected. You might be able to trace that back to someone or to some event that occurred. You will want to try and figure out how those files and services got there. And what admin might have initiated the infection.
To clean your server, start with Microsoft's Malicious Software Removal Tool.
mrt.exe /f
If it doesn't report that it found anything, then next run a Defender (or 3rd party AV) full scan. If they don't detect the malware, then I would suggest installing Malwarebytes and try running its scan.
You can use sc.exe to delete those services.
sc.exe delete TheWierdServiceName
And make sure you fully update all machines with Windows Update.