Hackers use intriguing, casual, or nostalgic names to trick curious users into downloading and extracting compressed files, which then execute malicious scripts on the victim's computer.
: As the user watches the footage or scrolls through the pictures, the media begins to corrupt. Strange, non-human figures appear in the background of the party, or the people in the video begin acting in bizarre, terrifying ways that they don't seem to notice.
: The file unzips to reveal what looks like harmless home video files or photos from a group of friends having a party at a beach in the late 1990s or early 2000s.