Objective — Deobfuscate the attached files and contact the author with the reversed keys.
- Execution may take a moment.
- Contains no harmful elements.
- Avoid running on weak devices to prevent lag or force exits.
- Easy
- Average
- Hard
Note
All the obfuscators are belongs to their copyright owner, and this use is in accordance with the terms and conditions of the copyright holder.
- Reserved with Exotic Hridoy