1. άάάάά
  2. άΫ²°°°²Ϋά
  3. άάΫΫΫΫΫΫΫΫΫΫΫά
  4. °²ΫΫ²°°°°²ΫΫΫ²Ϋ
  5. °ΫΫ°° °²Ϋ°
  6. Ϋ²° °°²ΫΫΫ
  7. Ϋ° °²Ϋ
  8. Ϋ²° °°²ΫΫΫ
  9. ω °Ϋ° °²Ϋ ω
  10. άά ω Ϋ²° °°²²ΫΫ° ω άά
  11. άάΫΫΫΫΫΫάά ω °Ϋ²° °²Ϋ ω άάΫΫΫΫΫΫάά
  12. άΫΫΫ°ΫίΫ±ΫΫΫΫά άάί ²Ϋ²²° °°²ΫΫΫ° ίάά άΫΫΫΫ±ΫίΫ°ΫΫΫά
  13. ίΫΫ±έ: ίίΫΫΫ±Ϋί άάΫΫΫΫΫΫάάάάάΫΫ²άά ίΫ±ΫΫΫίί :ή±ΫΫί
  14. ±ίά ω ίί άίί °²ΫΫ² ²ΫΫ²°°²Ϋ²Ϋ ίίά ίί ω άί±
  15. ω ίά ίΫί ίίίίίίίΫΫΫ άί ω
  16. ° ω ° άΫΫίίίΫΫά ίΫίίΫάΫίίΫί άΫΫίίίΫΫά Ϋ άΫΫίίίΫΫά ίΫΫΫίίίΫΫά ° ω °
  17. ° ° °° °°° Ϋ ΫίίίΫ Ϋ ° Ϋ ΫίΫίΫ Ϋ ° Ϋ ΫίίίΫ Ϋ ° Ϋ ΫίίίΫ Ϋ ° Ϋ ΫίίίΫ Ϋ °°° °° ° °
  18. ± ± ±± ±±± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ± Ϋ°Ϋ ±±± ±± ± ±
  19. ² ² ²² ²²² Ϋ±Ϋ ² Ϋ±Ϋ ² Ϋ±Ϋ ² Ϋ±Ϋ ² Ϋ±ΫίίίΫίί ² Ϋ±Ϋίίίίίί ² Ϋ±Ϋ ² Ϋ±Ϋ ²²² ²² ² ²
  20. ί ί ί² ίίί Ϋ±Ϋ ί Ϋ±Ϋ ί Ϋ²Ϋ ί Ϋ²Ϋ ί Ϋ±Ϋ ί ί Ϋ±Ϋ ίίΫ±Ϋ ί Ϋ±ΫάάάΫ±Ϋ ίίί ²ί ί ί
  21. Δ ω Δ² ΔΔΔάΫΫΫάΔάΫΫΫάΔάΫΫΫάΔάΫΫΫάΔάΫΫΫάΔΔΔΔΔΔΔάΫΫΫάάάΫΫΫάΔάΫΫΫάΫάΫΫΫάΔΔΔ ²Δ ω Δ
  22. ω άΫΫΫά άάάά άάάΫ ΫΫάά άΫΫΫά ω
  23. ώ ά ί ά ί ί ώ°Ϋ²° °ΫΫ° °²Ϋ²ώ ί ί ά ί ά
  24. άΫΫί ά ί ° Ϋ°° ²Ϋ° °²Ϋ° ° ί ά ίΫΫά
  25. °²±Ϋ ά ί ± Ϋ°° ²Ϋ° °²Ϋ° ± ί ά Ϋ²²Ϋ
  26. ίΫ²ΫάΫί ± ίίί ίίί ίίίί ± ίΫάΫ²Ϋί
  27. ΪΔ±ΔίίίΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔ[ ώ AMPED PC PRESENTS ώ ]ΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔίίίΔ²ΔΏ
  28. ³ ³
  29. ³ Crypto Obfuscator v2013.R2.build.131225 (c) LogicNP ³
  30. ³ ³
  31. ΓΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔωΒωΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔ΄
  32. ³ Release Date: 2014-01-28 ° Disks : 04 ³
  33. ³ Protection : - ³ Release Type: Application ³
  34. ΓΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΑΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔ΄
  35. ° Requirements: - °
  36. ΐΔΔΔΔωωΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔωωΔΔΔΔΩ
  37. ί ίίί Ϋ²Ϋί ίίίίίίίίίίίίίίίίί°ίίίίίίίίίίίίίίίίίίίίί°ίίίίίίίίίίίίίίίίί ίΫ²Ϋ ίίί ί
  38. ώ άίωΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔ[ ώ RELEASE DESCRIPTION ώ ]ΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔωίά ώ
  39. NOTE: We missed a check in our previous crack. This crack however fixes it.
  40. Powerful Code Protection, Obfuscation, Optimization And Simplified
  41. Deployment For Your .NET Apps.
  42. Uses sophisticated techniques like symbol renaming, control flow
  43. obfuscation, resource protection, metadata reduction,
  44. anti-decompiler/disassembler protection, digital watermarking and more!
  45. Crypto Obfuscator renames all your class, field, method, properties,
  46. methods, parameter and generic parameter names to totally different
  47. strings. It is impossible to determine the original names from the new
  48. names. This makes it impossible for someone to try to determine the
  49. purpose or functionality of the renamed entity from its name.
  50. - Protect your code and intellectual property from hackers,
  51. crackers or competitors.
  52. - Save time and money investment in your software.
  53. - Increase ROI for your business.
  54. - Save time and money spent handling deployment related issues.
  55. - Improve performance of your application.
  56. - Build a fast, light-weight and robust application.
  57. Crypto Obfuscator can also rename fields or methods with different
  58. signatures to the same name. For example two fields having types int and
  59. boolean will be given the same name. Similarly two methods will different
  60. parameters will be given the same name. In the case of methods, the
  61. method return type is also used in the signature even though high-level
  62. languages such as C and VB.Net do not support overloading by return type.
  63. The .Net runtime is able to differentiate between the fields/methods
  64. without any problem since the signatures are different. Needless to say,
  65. this scheme makes it even harder to reverse-engineer your code.
  66. Crypto Obfuscator also has a renaming mode which renames all classes,
  67. fields, methods, etc to fake but realistic names like
  68. Domain/Log/Stream/etc (for classes) or Open/Close/Clear/Delete/etc for
  69. methods and so on. This makes it extremely difficult to differentiate
  70. between symbols excluded from obfuscation and obfuscated symbols.
  71. ά ί ί ά
  72. ίίάΫΫ ί ίίίίί ίίίίίί°ίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίί°ίίίίίί ίίίίί ί ΫΫάίί
  73. ΪΔΔΔ²ωΔΔΔΔΔΔΔΔΔΔΔΔΔΔ[ ώ HOW TO INSTALL/RUN THIS RELEASE ώ ]ΔΔΔΔΔΔΔΔΔΔΔΔΔΔω²ΔΔΔΏ
  74. ³ ³
  75. ³ o1 - Unpack the release into a directory of your choice. ³
  76. ³ o2 - Run the installer and install it. ³
  77. ³ o3 - Copy the files from /crack into the installation directory. ³
  78. ³ o4 - Have a go with this unlimited trial, but buy it if you will use it. ³
  79. ³ o5 - As always, make sure to have a firewall to block outbound connections. ³
  80. ³ ³
  81. ΐΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔωωωΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΔΩ
  82. ίίάΫΫ ί ίίίίί ίίίίίί°ίίίίίίίίίίΫΫίίΫΫΫΫίίΫΫΫΫίίίίίίίίί°ίίίίίί ίίίίί ί ΫΫάίί
  83. ±ίά ω ίί Ϋ° °°Ϋ° °Ϋ² <prs/asc> ίί ω άί±
  84. ω ° Ϋ°° °²Ϋ° °Ϋ° ° ω
  85. ω Ϋ° °Ϋ² °Ϋ² ω
  86. Ϋ°° ²Ϋ° °Ϋ°
  87. Ϋ°°°Ϋ² °Ϋ°
  88. Ϋ²°²Ϋ° °Ϋ°
  89. Ϋ²²Ϋ° °Ϋ
  90. Ϋ²Ϋ°°άί
  91. ²ΫΫίί