A new startup program has been detected
which means that it is executing the function whose name is c which is exported by jkhfd.dll
I dissassembled the file(jkhfd.dll) and found the following list of exported functions-
(the function c, as I suspected, is exported)
Some sysinternals tools told me that the above dll is there(injected?) as the browser helper objects
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
From the above list of exported functions, most are implemented by the dll creator herself. But the win32 function(s) like LogonUser(which attempts to logon,probably remotely) has aroused my suspicion.
Since the dissassembler can't locate the functions in the dissassembly, please suggest some other way of reversing the dll ?
Any further info on this method of attack, that is, how can someone remotely inject BHOs(browser helper objects) into my browser ?