PK
}F3j֮ _rels/.rels ( PK }Fp injecteddll.nuspec ( Un6} ԚL&dum@l@݇(42V#^Iǟ藕%37ˤC*|lyMq2;~8HkeV!+!*>riE|-|v|,f6F< ui;ynL*`9T(pKd-GL#[$14Cm4F
)d=:8x'>ь]A9zߡ+$y"b/*`&I/+*bO >ɪ6/da/sƼ=_%Qerua,M[\Zqj"_4m'w&U"lqTƭ#+0+V?ѱE&Cۀ?fOz@9Vh3Q6NZ8b9}>?|HAbFAսա:ۄC^5Io,<׃dknVˣJ'ވ"ԴG~Hb%[7UŘkk#A]A~N<Zqߺݤ3:䇣
˩OŔy(~_ymw;p/_Q9]!fKizdf#ψ/^t_U3_PK }FjB tools/chocolateyInstall.ps1 ( QO0Md n'gL}R..N}~簂ρ\/ DRbX\~,+R"Ei<Y8K`|>8
<bJU-di%ʆBIt3~54[5soԲGaRWȕ51Rw.֝yqFFqIn^|S쐿`åm'j-tGa,gcoӡCkG6
mO]Cگ֒~=>rUaVPK
}F
Q package/services/metadata/core-properties/e78d142bda7e45d6808b4cabf9ef76c4.psmdcp ( Nir SoferDLL injection is a quite common technique used by many programs and utilities, so the fact that you have injected DLLs in your system doesn't mean that something is wrong.
The following type of legitimate programs may use DLL injection technique:
* Programs that listen to keystroke on your systems: Macro recorders, key loggers, and so on...
* Programs that listen to mouse moves and/or change the default mouse behavior. For example: Volumouse utility uses the vlmshlp.dll for listening the mouse wheel moves, and use it for changing the sound volume.
* Debugging and diagnostics tools. For example: Microsoft Spy++ utility
* Security related programs: Firewalls, Antivirus programs, AntiSpyware programs, and so on.
* Programs that are well integrated into Windows environment. For example: Babylon translation software uses CAPTLIB.DLL in order to activate the dictionary with mouse buttons and the keyboard.
In addition to the above list, DLL injection may also be used by malicious programs (Viruses, Trojans, Spywares).injecteddll1.00dll process rootkit securityInjectedDLLchoco, Version=0.9.9.2, Culture=neutral, PublicKeyToken=79d02ea9cad655eb;Microsoft Windows NT 6.3.9600.0;.NET Framework 4PK
}FUd, [Content_Types].xml ( PK-
}F3j֮ _rels/.relsPK- }Fp 5 injecteddll.nuspecPK- }FjB ` tools/chocolateyInstall.ps1PK-
}F
Q package/services/metadata/core-properties/e78d142bda7e45d6808b4cabf9ef76c4.psmdcpPK-
}FUd, [Content_Types].xmlPK )