π Happy Halloween, Screamer Wiki! π
Hikaru.exe: Difference between revisions
(Added image, deleted excess tags and a template that didn't work) |
mNo edit summary Β |
||
(34 intermediate revisions by 13 users not shown) | |||
Line 1: | Line 1: | ||
{{Infobox | |||
'''hikaru.exe''', | |title = Madoka.exe | ||
|image = shesactuallykindacute.png | |||
|maker = Qiwen Lin | |||
|type = Application | |||
|date = September 9th, 2001 | |||
|imagecaption = The '''Hikaru.exe''' program icon. | |||
}} | |||
'''hikaru.exe''', alse known as the '''Sadako virus''' in Japan, was a Taiwanese [[screamer]] [[program]]. It is a variant of the Win32/FlaGhost malware. The original author is Qiwen Lin (ζ εζ) and it was written in the [[wikipedia:Hot_Soup_Processor|Hot Soup Processor]] programming language. | |||
If the user runs it, it doesn't seem to do anything. However, it silently becomes present in the operating computer's memory. and triggers a payload at random times, which shows a full-screen picture of [[wikipedia:Teke Teke|Teke Teke]], similar but not the same as [[McDonalds.exe]], with a scream sound effect. It quickly spread over the Internet in Japan in the early 2000s. However, it didn't become as popular as its cousin. Some have complained that even when resetting the computer. However, the application will later continue its usual behavior. | |||
The most recent version of this virus is "0.4" | |||
==Trivia== | |||
* Just like [[Madoka.exe]], According to the decompiled source code, holding down F10 when double clicking the original EXE will cause the malware to decompile itself and unpack all the assets and codes. However, this behavior is tested not working on a WinXP virtual machine. | |||
==Gallery== | |||
<gallery widths="200" spacing="small" position="center" captionalign="center" bordersize="small"> | |||
themurderwasthefacetheygiveme.png|<font color="white">The Application's icon (0.4)</font> | |||
Doestheiconactuallylookslikeher.png|<font color="white">Censored screamer image.</font> | |||
</gallery> | |||
==Links== | ==Links== | ||
<u>NOTE</u>: The following download link contains a [[screamer]] application <span style="color:red">that may harm your computer!</span> | <u>NOTE</u>: The following download link contains a [[screamer]] application <span style="color:red">that may harm your computer!</span> | ||
* '''ftp.vector.co.jp/21/70/1811/hikaru04.zip''' | * ftp.vector.co.jp/21/70/1811/hikaru04.zip | ||
* '''Permalink:''' web.archive.org/web/20240227033035/ftp.vector.co.jp/21/70/1811/hikaru04.zip | |||
*'''Author's homepage''': web.archive.org/web/20040806024306/geocities.co.jp:80/SiliconValley-Oakland/8358/mysoft/mysoft.html | |||
* '''Preview:''' youtube.com/watch?v=L4jOfslX6uA | |||
{{ | ==See also== | ||
[[Category:Applications]] | *[[Happy Days.exe]] | ||
*[[Madoka.exe]] | |||
*[[McDonalds.exe]] | |||
{{Maliciousnav}} | |||
{{Comments}} | |||
[[Category:Malware]][[Category:Applications]] | |||
[[Category:Other scary images]] | [[Category:Other scary images]] | ||
[[Category:2000]] | [[Category:2000]] | ||
[[Category:Malicious scripts]] | [[Category:Malicious scripts]] | ||
Β | [[Category:Joke screamers]] | ||
[[Category:Other makers]] |
Latest revision as of 07:41, 17 June 2024
hikaru.exe, alse known as the Sadako virus in Japan, was a Taiwanese screamer program. It is a variant of the Win32/FlaGhost malware. The original author is Qiwen Lin (ζ εζ) and it was written in the Hot Soup Processor programming language.
If the user runs it, it doesn't seem to do anything. However, it silently becomes present in the operating computer's memory. and triggers a payload at random times, which shows a full-screen picture of Teke Teke, similar but not the same as McDonalds.exe, with a scream sound effect. It quickly spread over the Internet in Japan in the early 2000s. However, it didn't become as popular as its cousin. Some have complained that even when resetting the computer. However, the application will later continue its usual behavior.
The most recent version of this virus is "0.4"
Trivia
- Just like Madoka.exe, According to the decompiled source code, holding down F10 when double clicking the original EXE will cause the malware to decompile itself and unpack all the assets and codes. However, this behavior is tested not working on a WinXP virtual machine.
Gallery
-
The Application's icon (0.4)
-
Censored screamer image.
Links
NOTE: The following download link contains a screamer application that may harm your computer!
- ftp.vector.co.jp/21/70/1811/hikaru04.zip
- Permalink: web.archive.org/web/20240227033035/ftp.vector.co.jp/21/70/1811/hikaru04.zip
- Author's homepage: web.archive.org/web/20040806024306/geocities.co.jp:80/SiliconValley-Oakland/8358/mysoft/mysoft.html
- Preview: youtube.com/watch?v=L4jOfslX6uA