09-08-2018, 10:18 AM
There's a lot of SHA256 checksums (not hashes passwords) in the file. Sometimes they are paired with an IV, which doesn't make sense, since SHA256 does not use an IV. So the speculation would be that there's some unknown cipher involed. In order to crack them you need to need more about the details of how there were produced. IOW, you need to study the sources of the application which created the files.