While the name may seem legitimate, files are a common vector for spreading malware. If you received this file from an unsolicited source (like a random email or a third-party download site), treat it with extreme caution.
If you still need to access the contents of this file, follow these steps:
: Attackers often name files after popular products to trick users into downloading and executing malicious code.