Run a deep scan of your system using a reputable security suite.
Avoid the urge to see what's inside. Extraction can trigger the execution of hidden scripts.
Cybercriminals use randomized names like this for several strategic reasons:
Delete the file and empty your recycle bin immediately.