Once executed, the file may drop additional malicious payloads, modify system registries, or establish a connection with a Command and Control (C2) server to exfiltrate your data [2, 6].
Use a reputable antivirus or anti-malware tool (such as Malwarebytes or Windows Defender) to perform a full system scan immediately [5, 6].
Permanently delete the file (Shift + Delete) to prevent accidental execution.