0% found this document useful (0 votes)
792 views

Master Key

1. The document provides instructions for decrypting files that were encrypted using a private key, including downloading a decrypter program and entering the private key and personal ID. 2. It warns that if an incorrect private key is entered, the encrypted files will be damaged and unable to be restored, so backing up the encrypted files is recommended before attempting decryption. 3. The user is given options to decrypt a single file, all files in a folder, or all files at once, and told to wait for a "Complete" message once decryption starts.

Uploaded by

Ari Wahyudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
792 views

Master Key

1. The document provides instructions for decrypting files that were encrypted using a private key, including downloading a decrypter program and entering the private key and personal ID. 2. It warns that if an incorrect private key is entered, the encrypted files will be damaged and unable to be restored, so backing up the encrypted files is recommended before attempting decryption. 3. The user is given options to decrypt a single file, all files in a folder, or all files at once, and told to wait for a "Complete" message once decryption starts.

Uploaded by

Ari Wahyudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

Scan your PC any free antivirus like:


https://www.avg.com/en-us/free-antivirus-download

2. Backup all your encrypted files to external drive before start decrypting.
If you entered incorrect key, all your data will be crashed and we can never
restore it.
So you need to make backup of all encrypted files.

3. Decrypter download link:


https://we.tl/t-Q4CtXUiLNv

4. Start decrypter_2.exe

ENTER FIELDS: (enter all fields without empty space)

Private key:

-----BEGIN PRIVATE KEY-----

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-----END PRIVATE KEY-----

Personal ID:
x3L4iKA2r8oeVHQAyoIvElaVa7uF4Ucn3UI7nkLb

File name:
_readme.txt
press +

Private key:

-----BEGIN PRIVATE KEY-----

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-----END PRIVATE KEY-----

Personal ID:
PudfHNy57KnZX7JgM3qZqXmBFG8oBnAXljw1XTt1

You need copy-paste Private key with -----BEGIN PRIVATE KEY----- and -----END
PRIVATE KEY-----
If you want choose files for decryption: Click Decrypt file or Decrypt folder.
If you want decrypt all files, click Start.
Wait "Complete" massage.

Attention!
If you enter invalid key, and try to decrypt file (files), it will be damaged.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy