At this point my best bet would probably be trying to bribe a friend to come over and give it a shot. I'll try to do that soon and let you know if I make any progress.
That sounds like a good idea
With that being said, I'm still going to remain VERY skeptical that a typo was made until proven otherwise.
I agree... I'm grasping at straws here.
I discussed this on another message board with one of the developers and the user "clubshaft", who originally started this thread. I joined in on the discussions clubshaft started because it was the only user with a similar problem I could find and wasn't on a really old thread. His english doesn't translate very well, and this stuff is already over my head so I'm not sure I understand 100%, but it seems he did find a solution.
If you are interested and have time, check out the conversation and let me know what you make of it. Here is a link:
https://github.com/jim618/multibit/issues/620Thanks for the link, I added a note to that issue a short while ago. It appears that clubshaft was using the correct password, but more than one of his .wallet and .key files were corrupted, and he eventually was able to recover an older .key file he retrieved using a file restoration utility. I'm not sure I agree with his conclusion that the file corruption was the result of a bug in MultiBit, but I've no way to tell. It would be interesting to examine both his corrupted and uncorrupted files to look for differences... that might give some insight as to the source of the corruption (or it might not).
Have you tried following gary-rowe's advice regarding openssl yet? I'll repost it below (slightly modified for a default Windows install):
Now that you have a .key file do the following (I've made the instructions step by step for Windows):
1. Ensure you have
OpenSSL installed. Specifically, you should choose "Win32 OpenSSL v1.0.0o Light".
2. Copy your multibit key file into the C:\OpenSSL-Win32\bin folder, and rename it to "multibit.key".
3. Open the command prompt and navigate to C:\OpenSSL-Win32\bin (on Windows type "cd \OpenSSL-Win32\bin" at the command prompt).
4. Enter the following at the command prompt on a single line:
openssl enc -d -p -aes-256-cbc -a -in multibit.key -out decrypted.txt -pass pass:yourpassword
Change "yourpassword" to your password (but leave the "pass:" prefix in there).
OpenSSL will attempt to decrypt the file and will tell you if it is successful. The decrypted keys will be placed in decrypted.txt and should now be considered compromised. You'll need to sweep funds out of them as soon as possible into a safe area. If you have those keys you have your bitcoins.
If you open the decrypted.txt file in a text editor like Notepad, you should see one or more lines like this, one for each key:
L3BdsUEuHb15LgPp8ZpEhckMdRj4bPnrj352RgqgUUVKvngnBDph 2014-05-20T18:38:41Z
You can see the key file format here:
https://multibit.org/en/help/v0.5/help_exportingPrivateKeys.html