: Attackers use provocative or sensational filenames to trick users into downloading and executing malicious code.

: Remove the file from your computer and empty your recycle bin.

: If you have already downloaded this file, do not extract it or run any files found inside.