how it works:
put a .payload or a .nb file in the same folder of the app, open a command prompt and write:
where os.nb / os.nb.payload is the name of your target file.....
wait and finger cross that the target file was protected in a way known by my apps, if my apps "deprotect" the target file, you can dump it then
version 2 a bug on output string solved!