If you did run it, disconnect your device from Wi-Fi or Ethernet to stop the malware from sending your data to the attacker.
Allows an attacker to take full control of the infected system. Common Characteristics
May use a video player icon (like VLC or Windows Media Player) despite being an application.
It acts as a downloader or dropper . Once executed, it typically communicates with a Command and Control (C2) server to download more dangerous payloads. Behavior:
If you haven't executed the file, delete it immediately and empty your Recycle Bin.
It may copy itself to the %AppData% or %Temp% folders and create a Registry key or Scheduled Task to ensure it runs every time the computer starts.