In every posts of a crypter the passwords are encrypted for example:

C-Infinity:

v1-v2 Pass:Arch Enemy-v1-

Ad/2Kj/5sS/2sw/4Sv/7Td/8Lg/8sS/2sw/4Nb/2Xs/3Df/6sS/2te/1Sv/8Aq/2Dg/2sS/2as/7Ft/5Ax/3Mh/2sS/2sd/5Fg/3Ññ/8Ds/7sS/2as/7Mh/2Cz/3Kj/5sS/2te/1Mh/2Ba/2Ft/5sS/2sw/4Dg/2Ad/2Vd/3sS/2gd/6Kl/6Yt/5Ft/5sS/2gd/6Sv/8Xa/2Mh/2sS/2as/7Ds/3Sc/2Mh/2sS/2ad/2Sv/8Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Xa/2Mh/2sS/2as/7Ds/3Sc/2Mh/2sS/2ad/2Sv/8Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Ad/2Mh/2sS/2sw/4Kl/6Wz/3Sv/7sS/2sr/3Tk/9Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Bx/6Kl/6sS/2tr/2Ja/2Qw/3Sd/8sS/2tr/2Vd/3Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Ad/2Mh/2sS/2sw/4Kl/6Wz/3Sv/7sS/2sr/3Tk/9Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Tr/3Tk/9sS/2ad/2Tk/9Ax/3Kñ/3sS/2sd/5Ss/3Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Tr/3Tk/9sS/2ad/2Tk/9Ax/3Kñ/3sS/2sd/5Ss/3Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Sc/2Ds/3sS/2qw/9Dg/2Td/8Lg/8sS/2sw/4Nb/2Vd/3Ad/2sS/2qw/9Sv/7Ft/5Mh/2sS/2sw/4Ft/5Sc/2Mh/2sS/2ad/2Sv/8Hx/8Nb/2sS/2ad/2Mh/2Vd/3Ad/2sS/2qw/9Sv/7Ft/5Vd/3sS/2as/7Mh/2Sc/2Mh/2sS/2ad/2Sv/8Tr/3Tk/9sS/2ad/2Tk/9Vd/3Ad/2sS/2qw/9Sv/7Ft/5Vd/3sS/2as/7Mh/2Sc/2Mh/2sS/2ad/2Sv/8Hx/8Nb/2sS/2ad/2Mh/2Vd/3Ad/2sS/2qw/9Sv/7Ds/3Ae/9sS/2tr/2Mh/2Cz/3Ft/5sS/2ad/2Mh/2Tr/3Tk/9sS/2ad/2Tk/9Vd/3Ad/2sS/2qw/9Sv/7Ft/5Mh/2sS/2sw/4Ft/5Zx/3Ae/9sS/2qw/9Vd/3Yt/5Dg/4sS/2sd/5Vd/3Vd/3Ad/2sS/2qw/9Sv/7Vd/3Ae/9sS/2sr/3Mh/2Ax/3Kñ/3sS/2sd/5Ss/3Xs/3Df/6sS/2te/1Sv/8Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Cz/3Vd/3sS/2sw/4Mh/2Ad/2Er/5sS/2ad/2Ss/3Vd/3Ad/2sS/2qw/9Sv/7Vd/3Ae/9sS/2sr/3Mh/2Aq/2Nb/2sS/2ad/2Tk/9Cz/3Kj/5sS/2te/1Mh/2Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Sc/2Ds/3sS/2qw/9Dg/2Tr/3Tk/9sS/2ad/2Tk/9Vd/3Ad/2sS/2qw/9Sv/7Ds/3Ae/9sS/2tr/2Mh/2Aq/2Nb/2sS/2ad/2Tk/9Cz/3Kj/5sS/2te/1Mh/2Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Sc/2Mh/2sS/2ad/2Sv/8Hx/8Nb/2sS/2ad/2Mh/2Vd/3Ad/2sS/2qw/9Sv/7Ft/5Vd/3sS/2as/7Mh/2Wz/3Sv/7sS/2sr/3Tk/9Vd/6Sv/7sS/2te/1Mh/2Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Ax/3Er/5sS/2te/1Sv/8Bx/6Vd/3sS/2tr/2Er/5Vd/3Ad/2sS/2qw/9Sv/7Vd/3Ae/9sS/2sr/3Mh/2Cv/8Ft/5sS/2te/1Ae/9Vd/6Sv/7sS/2te/1Mh/2Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Xa/2Mh/2sS/2tr/2Ja/2Ad/2Er/5sS/2te/1Ae/9Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Ad/2Kj/5sS/2sw/4Sv/7Bx/6Vd/3sS/2te/1Sd/7Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Sc/2Ds/3sS/2qw/9Dg/2Bx/6Kl/6sS/2as/7Vd/3Vd/3Ad/2sS/2qw/9Sv/7Sv/7Nb/2sS/2gd/6Mh/2Sc/2Ds/3sS/2qw/9Dg/2Td/8Lg/8sS/2sw/4Nb/2Vd/3Ad/2sS/2qw/9Sv/7Ft/5Mh/2sS/2sw/4Ft/5Sc/2Mh/2sS/2ad/2Sv/8Hx/8Nb/2sS/2ad/2Mh/2Vd/3Ad/2sS/2qw/9Sv/7Ft/5Vd/3sS/2as/7Mh/2Sc/2Mh/2sS/2ad/2Sv/8Tr/3Tk/9sS/2ad/2Tk/9Vd/3Ad/2sS/2qw/9Sv/7Ft/5Vd/3sS/2as/7Mh/2Sc/2Mh/2sS/2ad/2Sv/8Hx/8Nb/2sS/2ad/2Mh/2Vd/3Ad/2sS/2qw/9Sv/7Ds/3Ae/9sS/2tr/2Mh/2Cz/3Ft/5sS/2ad/2Mh/2Tr/3Tk/9sS/2ad/2Tk/9Vd/3Ad/2sS/2qw/9Sv/7Ft/5Mh/2sS/2sw/4Ft/5Xa/2Mh/2sS/2as/7Ds/3Sc/2Mh/2sS/2ad/2Sv/8Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Xa/2Mh/2sS/2as/7Ds/3Sc/2Mh/2sS/2ad/2Sv/8Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Ad/2Mh/2sS/2sw/4Kl/6Wz/3Sv/7sS/2sr/3Tk/9Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Bx/6Kl/6sS/2tr/2Ja/2Qw/3Sd/8sS/2tr/2Vd/3Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Ad/2Mh/2sS/2sw/4Kl/6Wz/3Sv/7sS/2sr/3Tk/9Vd/3Ad/2sS/2qw/9Sv/7Sv/7Ja/2sS/2tr/2Sv/7Tr/3Tk/9sS/2ad/2Tk/9Ax/3Kñ/3sS/2sd/5Ss/3Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3Tr/3Tk/9sS/2ad/2Tk/9Ax/3Kñ/3sS/2sd/5Ss/3Vd/3Ad/2sS/2qw/9Sv/7Dg/4Mh/2sS/2sd/5Ds/3

How can I decrypt it?
Donde esta la duda?
Cifrado infinity pass Arch Enemy-v1-

PD: use the code tags
666699966999999996699966699999
666699966999999996699966969999
699999966999999996699966996999
666699966999999996699966999699
666699966999999996699966999699
699999996699999966999966996999
699999999669999669999966969999
699999999996666999999966699999
https://reversecodes.wordpress.com

http://indeseables.github.io/
Responder

Volver a “Dudas y Preguntas”