Happy 11th anniversary, screamer wiki!
Hikaru.exe: Difference between revisions
No edit summary |
mNo edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 2: | Line 2: | ||
|title = Madoka.exe | |title = Madoka.exe | ||
|image = shesactuallykindacute.png | |image = shesactuallykindacute.png | ||
|maker = | |maker = Qiwen Lin | ||
|type = Application | |type = Application | ||
|date = September 9th, 2001 | |date = September 9th, 2001 | ||
|imagecaption = The '''Hikaru.exe''' program icon. | |imagecaption = The '''Hikaru.exe''' program icon. | ||
}} | }} | ||
'''hikaru.exe''', alse known as the '''Sadako virus''' in Japan, was a | '''hikaru.exe''', alse known as the '''Sadako virus''' in Japan, was a Taiwanese [[screamer]] [[program]]. It is a variant of the Win32/FlaGhost malware. The original author is Qiwen Lin (林 啟文) and it was written in the [[wikipedia:Hot_Soup_Processor|Hot Soup Processor]] programming language. | ||
If the user runs it, it doesn't seem to do anything. However, it silently becomes present in the operating computer's memory. and triggers a payload at random times, which shows a full-screen picture of [[wikipedia:Teke Teke|Teke Teke]], similar but not the same as [[McDonalds.exe]], with a scream sound effect. It quickly spread over the Internet in Japan in the early 2000s. However, it didn't become as popular as its cousin. Some have complained that even when resetting the computer. However, the application will later continue its usual behavior. | If the user runs it, it doesn't seem to do anything. However, it silently becomes present in the operating computer's memory. and triggers a payload at random times, which shows a full-screen picture of [[wikipedia:Teke Teke|Teke Teke]], similar but not the same as [[McDonalds.exe]], with a scream sound effect. It quickly spread over the Internet in Japan in the early 2000s. However, it didn't become as popular as its cousin. Some have complained that even when resetting the computer. However, the application will later continue its usual behavior. | ||
The most recent version of this virus is "4. | The most recent version of this virus is "0.4" | ||
==Trivia== | |||
* Just like [[Madoka.exe]], According to the decompiled source code, holding down F10 when double clicking the original EXE will cause the malware to decompile itself and unpack all the assets and codes. However, this behavior is tested not working on a WinXP virtual machine. | |||
==Gallery== | ==Gallery== | ||
<gallery widths="200" spacing="small" position="center" captionalign="center" bordersize="small"> | <gallery widths="200" spacing="small" position="center" captionalign="center" bordersize="small"> | ||
themurderwasthefacetheygiveme.png|<font color="white">The Application's icon (4 | themurderwasthefacetheygiveme.png|<font color="white">The Application's icon (0.4)</font> | ||
Doestheiconactuallylookslikeher.png|<font color="white">Censored screamer image.</font> | Doestheiconactuallylookslikeher.png|<font color="white">Censored screamer image.</font> | ||
</gallery> | </gallery> | ||
Line 21: | Line 25: | ||
<u>NOTE</u>: The following download link contains a [[screamer]] application <span style="color:red">that may harm your computer!</span> | <u>NOTE</u>: The following download link contains a [[screamer]] application <span style="color:red">that may harm your computer!</span> | ||
* ftp.vector.co.jp/21/70/1811/hikaru04.zip | * ftp.vector.co.jp/21/70/1811/hikaru04.zip | ||
* '''Preview''' | * '''Permalink:''' web.archive.org/web/20240227033035/ftp.vector.co.jp/21/70/1811/hikaru04.zip | ||
*'''Author's homepage''': web.archive.org/web/20040806024306/geocities.co.jp:80/SiliconValley-Oakland/8358/mysoft/mysoft.html | |||
* '''Preview:''' youtube.com/watch?v=L4jOfslX6uA | |||
==See also== | ==See also== | ||
*[[Happy Days.exe]] | *[[Happy Days.exe]] |
Latest revision as of 07:41, 17 June 2024
hikaru.exe, alse known as the Sadako virus in Japan, was a Taiwanese screamer program. It is a variant of the Win32/FlaGhost malware. The original author is Qiwen Lin (林 啟文) and it was written in the Hot Soup Processor programming language.
If the user runs it, it doesn't seem to do anything. However, it silently becomes present in the operating computer's memory. and triggers a payload at random times, which shows a full-screen picture of Teke Teke, similar but not the same as McDonalds.exe, with a scream sound effect. It quickly spread over the Internet in Japan in the early 2000s. However, it didn't become as popular as its cousin. Some have complained that even when resetting the computer. However, the application will later continue its usual behavior.
The most recent version of this virus is "0.4"
Trivia
- Just like Madoka.exe, According to the decompiled source code, holding down F10 when double clicking the original EXE will cause the malware to decompile itself and unpack all the assets and codes. However, this behavior is tested not working on a WinXP virtual machine.
Gallery
-
The Application's icon (0.4)
-
Censored screamer image.
Links
NOTE: The following download link contains a screamer application that may harm your computer!
- ftp.vector.co.jp/21/70/1811/hikaru04.zip
- Permalink: web.archive.org/web/20240227033035/ftp.vector.co.jp/21/70/1811/hikaru04.zip
- Author's homepage: web.archive.org/web/20040806024306/geocities.co.jp:80/SiliconValley-Oakland/8358/mysoft/mysoft.html
- Preview: youtube.com/watch?v=L4jOfslX6uA