While I didnt figure out how to open python 2.7. in the folder I created for unzipped files and the key / wallet file - I could only open powershell, which says there is no python -
Don't use powershell... you need the "standard" windows "command prompt"... you'll need to press the "start" button, then type
cmd (or press "Win+R" and enter
cmd)
So I installed openssl but I dont know what to do with it. When I open command console in windows and enter the recommended line it says the commando openssl is not known. If I go the folder where the .key file is in and open powershell there, I get an error msg (I will translate whats not english):
It's saying that because "openssl" is not installed in your "PATH"... when you type commands, windows looks in some very specific places to find the command/app to run... if you haven't told Windows where to find "openssl", it won't be able to find it.
Again, don't use powershell... that won't help.
However, read below... it should solve your problem and make it easy for you to run the scripts without needing to use the command prompt
I was able to open .key file by simply drag and drop it onto decrypt_multibit_classic_keys.py . It asks for the pw; if I enter it wrong it says: "incorrect password". If I enter it correctly, python just shuts down.
When I use drag and drop for .wallet file onto decrypt_multibit_classic_walletkeys.py python only opens for a split second and then closes again.
Do you have an idea how I can get the desired output instead of python just shutting down?
It's because there is no "pause" in the script, it's just dumping output and then the "py.exe" window will be closing immediately. A small oversight on my behalf, as I never imagined anyone would use "drag and drop"
So, I have just updated the scripts... and they now have a "Press any key to continue..." prompt at the end of them. If you redownload the scripts:
https://github.com/HardCorePawn/multibit_recovery you should find that you can use the drag and drop, enter the password when prompted and it'll now wait at the end and you can see the output
I've even updated the "Readme" to include a note about "drag and drop"... thanks for the idea!
Also please note: I think I have my key allready unencrypted, however it looks off. Its format goes like this:
U2Fs........................................................................... ....
Wdo............................
No... that
is encrypted... the "U2F" indicates that you have an aes-256-cbc encrypted file.