First value looks like an account number, second value looks like a SHA-1 hash, third value looks like a piece of SHA1-hash used as salt (possibly for the second value).
Hashes cannot be decrypted in theory, but if you know the salt and how the value is generated with the salt, or if it isn't using salt you can break down the easy values with a rainbow table. Although there is no need to decrypt them.
If you need to recover a tibia account, just generate a new hash from a password you know and send it to him. Basically resetting his password to something we know, instead of trying to recover the password.