U2FsdGVkX18LSYm98B5HRgLWHgx35xMcsSpjjtdC9XG6iEYh9OC+vfyQA1fNmjEKs64cm/bntH7g
/AMeb5NNSEe9hzYAgp/DRvOR+GX9E95pGcl4Gb2AHGMyUfAww7uV
If so, then it could be a MultiBit .key file... which means it is AES256 encrypted text... if you don't know the password, then you'd have to attempt to bruteforce it... which could be problematic if your dead friend used a long complex password.
Your options would be btcrecover (https://github.com/3rdIteration/btcrecover/) or hashcat (https://hashcat.net/hashcat/) and use the "multibit2john" script to extract the hash from the .key file and then bruteforce the hash using hashcat.
yes it does! thanks! so that means it really is Multibit! thanks! i'm going to give Hashcat a try first, i don't think he used a complex password at all, but we'll see
thanks for all the help!