Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Loading hashes > Other programs
Loading password hashes from other programs
Reset Windows Password v10.4.1
Support for Windows 10 21H1 and some extra enhancements
MS Office password recovery tools
Support for MS Office 97-2003 formats, a major update in the password analysis module and mask attack syntax, etc.
Office recovery tools
Some major changes in the password extraction module, mask attack syntax, etc.
Reset Windows Password v10.3
Disk image creation tool, Windows PIN history decryption, new HTML/email parsing engine

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - loading hashes from other programs


Importing password hashes from other programs

 Finally, you can load the hashes to your project by importing them from other applications. The software supports the following formats:

  • PWDUMP - despite many disadvantages, this is a de facto standard format for storing password hashes. Important note: This format does not fully support national characters. Therefore, some usernames or comments may not display correctly. Windows Password Recovery also supports textual PWDUMP files in UNICODE.
  • L0phtCrack (*.lcs) - this file format is used by the LophtCrack software. The program supports all versions of LCS files, beginning with v4.
  • .hdt project files, which are used by Proactive Password Auditor (used to be PWSEX) from ElcomSoft. All versions of the format are supported, beginning with v3.
  • *.hsh files, which are exported by Proactive System Password Recovery from the same notorious company.
  • *.lst hash lists, created by Cain & Abel. Windows Password Recovery supports *.lst files beginning with v.4.9.12. The earlier versions of LST files used the ';' delimiter instead of 'TAB'. Unfortunately, the LST file does not have a marker that specifies the version; therefore, if the LST file is unreadable, you may have to manually replace all the field delimiters with the 'TAB'.
  • *.winpsw files, created by WinPassword, from good old LastBit. Supports all versions of WINPSW, beginning with v6.
  • SamInside (*.hashes) project files. This format is similar to text PWDUMP, but it is more flexible and uses the 0х7f character instead of the colon, which is more reasonable.
  • PasswordPro project files (*.hashes). This format is similar to text PWDUMP, except for several changes. It is used by the PasswordsPro product.
  • Passcape Universal Configuration Files (*.puc). This container is used in Reset Windows Password software and can contain several different dumps.
  • Plain hashes (*.*). Raw hashes in plain text format (32 or 16 characters in a line).
  • Passcape export/import files (*.peif). This format holds domain cached credentials and is used by Passcape software. For example, in Network Password Recovery.
  • Elcomsoft PSPR files (*.dcc). Textual files that contain domain cached credentials.
  • CACHEDUMP files (*.txt or *.cachedump). A standard placeholder for domain cached credentials (type 1). This format is obsolete.
  • John The Ripper DCC2 files (*.txt). A DCC2 hash format used in John The Ripper.
After importing hashes, the program automatically marks all the LM or NT hashes and launches the preliminary attack. This action is optional and can be disabled in the general settings. This option is enabled by default.