Skip to content

Wikimedia Europe

Visual Portfolio, Posts & Image Gallery for WordPress
Name_That_Pornstar_v1.1.0.zip

Benh LIEU SONG (Flickr), CC BY-SA 4.0, via Wikimedia Commons

Name_That_Pornstar_v1.1.0.zip

NASA Goddard Space Flight Center from Greenbelt, MD, USA, Public domain, via Wikimedia Commons

Name_That_Pornstar_v1.1.0.zip

Markus Trienke, CC BY-SA 2.0, via Wikimedia Commons

Name_That_Pornstar_v1.1.0.zip

Michael S Adler, CC BY-SA 4.0, via Wikimedia Commons

Name_That_Pornstar_v1.1.0.zip

Stefan Krause, Germany, FAL, via Wikimedia Commons

Name_That_Pornstar_v1.1.0.zip

Charles J. Sharp, CC BY-SA 4.0, via Wikimedia Commons

Name_That_Pornstar_v1.1.0.zip

JohnDarrochNZ, CC BY-SA 4.0, via Wikimedia Commons

Name_that_pornstar_v1.1.0.zip

: The file may attempt to create a scheduled task or add itself to the "Startup" folder to ensure it runs every time the PC boots [4].

Deep reports from malware analysis sandboxes (like Any.Run or Hybrid Analysis) for similar filenames typically show:

: Automated sandboxes often detect behaviors such as registry modifications, attempts to disable Windows Defender, and connections to known malicious Command & Control (C2) servers [3, 4]. Name_That_Pornstar_v1.1.0.zip

: Many versions are designed to scan browsers for saved passwords, cookies, and cryptocurrency wallet data [3].

: In many cases, the zip file does not contain the advertised game but rather a malicious executable ( .exe ) disguised with a generic icon [2]. Technical Analysis (Typical Findings) : The file may attempt to create a

: Connections are often observed to IP addresses in regions known for hosting malicious infrastructure, frequently attempting to download additional payloads [4, 5]. Recommendation

: Delete the file and clear your "Downloads" folder and recycle bin. Follow up with a full system scan using a tool like Malwarebytes [1, 5]. : In many cases, the zip file does

: Use a reputable antivirus or upload the file to VirusTotal to see multi-engine detection results.