Run a deep scan of your system using a reputable security suite.

Avoid the urge to see what's inside. Extraction can trigger the execution of hidden scripts.

Cybercriminals use randomized names like this for several strategic reasons:

Delete the file and empty your recycle bin immediately.