Access

spent a lot of time decrypting files obtained from f–. am i on right track? i am not even getting any clue. any hint?