The file is frequently associated with malicious activity, often serving as a container for malware distributed through phishing or deceptive downloads .
Remove the file from your system and empty your Trash/Recycle Bin.
It may contain a Trojan that allows a remote attacker to control your system.
Once opened, the malicious payload inside typically attempts to contact a "Command and Control" (C2) server to upload stolen data. ⚠️ Recommended Actions