link works without signing in
as for anti-cracking...
it has stuff that prevents it from being opened in a debugger (without some extra steps)
and if you manage to open it in the debugger, it has anti-debugging stuff so it crashes when u try to debug it
and if you manage to get past that, all the code is obfuscated and encrypted
and if you manage to get past that, it has a bunch of checksumming to prevent modification
and if you get past all of the above, then you're one good reverse engineerer

a good example is in the error report:
Parameter name: index
at System.Windows.Forms.ListView.SelectedListViewIte mCollection.get_Item(Int32 index)
at
‹.
.
‡˜(Object , Int32 )
at
‹.
.
(Object , EventArgs )
at System.Windows.Forms.ListView.OnSelectedIndexChan ged(EventArgs e)Parameter name: index
at System.Windows.Forms.ListView.SelectedListViewIte mCollection.get_Item(Int32 index)
at
‹.
.
‡˜(Object , Int32 )
at
‹.
.
(Object , EventArgs )
at System.Windows.Forms.ListView.OnSelectedIndexChan ged(EventArgs e)
the reason why it has all those 's and such is because of name obfuscation that uses unprintable/untypable characters