The difficulty in finding a cracker will be knowing how your encryption program derives the encryption key from the password.
Some low-end programs use something like SHA-256. Better programs use a salted multi-iteration process like PBKDF2. The reason PBKDF2 is used is because it's super slow, so it can't be optimised and automated brute-forcing will just crawl along.
To crack it, you
1) really need to know the exact key derivation algorithm including salt, so as to produce optimised code
2) Knowledge of what was in the file to start with (i.e. known plaintext)
With a bad key derivation function, like SHA, a cracker could test millions of keys per second. This will give you a good chance of cracking 5 "good" characters within a few hours.
If your program used PBKDF or something similar, and your cracker can only test a few thousand passwords per second - you'll be waiting weeks or months for 5 unknown characters.
If you are stuck scripting your program which tries to decrypt the file, and it attempts decryption and then checks a CRC - so that you can test 10 passwords a second - well, you're screwed.