: Use a trusted antivirus or anti-malware tool to quarantine and remove the file.
Security researchers and automated analysis platforms typically flag this file due to its suspicious behavior:
: The name itself—referencing "shellcode"—points to code used as a payload for exploiting software vulnerabilities to gain control over a system.
: It may attempt to contact remote servers (Command and Control) to receive instructions or exfiltrate data.