PK
J3 _rels/.rels ( PK JѠ2 k
de4dot.nuspec ( }Tn0?a-0Xɖa(u=leIʒ'Mc%ul0 "H[_>1Ob+`t10w"PzW6jqs5bOL tlavtm9,Yjx: 2=oRzNYi&kUb$C=IRg6jy7=a)2Ʊ=SP"cVW]k5a*]N{=!j[>HZDB/xdxp<:@9Tw_ԬzS@}ٳ >՛
n>
'N$$¶ !ք6
B^Ȅo/Fw!BJ
dr3\W@eͻ}h6)Hp4 JKD 8MH2+'طg=&ݹORXi5@i
mkZ⎳%L0k/\iwDxdհ<_GgEfjgS鲻KIw]~XPK JR tools/chocolateyInstall.ps1 ( PJ0!$"{Pz)R/|6km_OlB<3̛|(<'xT7+rIFe۽6M$LNl1b8Vs$CB9x?.]/ks(^O-Hb/ڗ!|%N)Ghd5`G,b3VvQv}WV'YU6"֝ ^znNX.>v7@t? PK J - tools/bin/AssemblyServer-CLR20-x64.exe.ignore ( PK J ) tools/bin/AssemblyServer-CLR20.exe.ignore ( PK J - tools/bin/AssemblyServer-CLR40-x64.exe.ignore ( PK J ) tools/bin/AssemblyServer-CLR40.exe.ignore ( PK J ' tools/bin/AssemblyServer-x64.exe.ignore ( PK J # tools/bin/AssemblyServer.exe.ignore ( PK
J! Q package/services/metadata/core-properties/4bf8a31f70724df8a14d7aa131c4c363.psmdcp ( 0xd4dde4dot is an open source (GPLv3) .NET deobfuscator and unpacker written in C#. It will try its best to restore a packed and obfuscated assembly to almost the original assembly. Most of the obfuscation can be completely restored (eg. string encryption), but symbol renaming is impossible to restore since the original names aren't (usually) part of the obfuscated assembly.de4dot0.0.0.15cil deobfuscator dnlib dotnet il msil net .net unpackerde4dotchoco, Version=0.10.5.0, Culture=neutral, PublicKeyToken=79d02ea9cad655eb;Microsoft Windows NT 6.2.9200.0;.NET Framework 4PK
JU* [Content_Types].xml ( PK-
J3 _rels/.relsPK- JѠ2 k
0 de4dot.nuspecPK- JR tools/chocolateyInstall.ps1PK- J - tools/bin/AssemblyServer-CLR20-x64.exe.ignorePK- J ) Z tools/bin/AssemblyServer-CLR20.exe.ignorePK- J - tools/bin/AssemblyServer-CLR40-x64.exe.ignorePK- J ) ( tools/bin/AssemblyServer-CLR40.exe.ignorePK- J ' tools/bin/AssemblyServer-x64.exe.ignorePK- J # tools/bin/AssemblyServer.exe.ignorePK-
J! Q O package/services/metadata/core-properties/4bf8a31f70724df8a14d7aa131c4c363.psmdcpPK-
JU* [Content_Types].xmlPK @