Quote from HaDeS
The server was formated a few weeks ago, and the data is irrecoverable
Thank you very much Z and Kender for the reply. With that analysis I'm sure that the file is encrypted with AES 256.
Quote from Kender
2. find a password cracker for winzip AES 256 encrypted files, run a wordlist and a bruteforce. If the pass is less than 12 characters you should be able to crack it within a year or so.
Quote from HaDeS
After all that, I started a brute-force attack and a dictionary one (The dictionary had over 20 million words and some that I always use for passwords)... these two approaches failed though.
That attack was performed with Elcomsoft Advanced Archive Password Recovery.
Quote from HaDeS
I sent a message to TheHiveMind, and he replied me that "try to check whether there are any 0x0a bytes in the file that are no t directly preceded by a 0x0d byte" to find if I used binary mode or text mode, and I found some 0a 0d bytes and others 0a 0x bytes.
At the moment, I think that isn't a error of transmision.