Use a reputable antivirus or EDR (Endpoint Detection and Response) tool to scan and remove the file.
If you have downloaded this file, do not execute it.
The file attempts to connect to a remote Command and Control (C&C) server to receive instructions or upload stolen data. Recommended Actions