Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Loading hashes > Other programs
Loading password hashes from other programs
Reset Windows Password v9.6
Custom recovery, some enhancements when recovering browsers passwords
New blog post
Regarding Windows Security
Wireless Password Recovery v6.1.5
A minor update
WPA password recovery benchmarks
New CPU and GPU devices

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - loading hashes from other programs


Importing password hashes from other programs

 Finally, you can load the hashes to your project by importing them from other applications. The software supports the following formats:

  • PWDUMP - despite many disadvantages, this is a de facto standard format for storing password hashes. Important note: This format does not fully support national characters. Therefore, some usernames or comments may not display correctly. Windows Password Recovery also supports textual PWDUMP files in UNICODE.
  • L0phtCrack (*.lcs) - this file format is used by the LophtCrack software. The program supports all versions of LCS files, beginning with v4.
  • .hdt project files, which are used by Proactive Password Auditor (used to be PWSEX) from ElcomSoft. Also supports all versions of the format, beginning with v3.
  • *.hsh files, which are exported by Proactive System Password Recovery from the same notorious company.
  • *.lst hash lists, created by Cain & Abel. Windows Password Recovery supports *.lst files beginning with v.4.9.12. The earlier versions of LST files used the ';' delimiter instead of 'TAB'. Unfortunately, the LST file does not have a marker that specifies the version; therefore, if the LST file is unreadable, you may have to manually replace all the field delimiters with the 'TAB'.
  • *.winpsw files, created by WinPassword, from good old LastBit. Supports all versions of WINPSW, beginning with v6.
  • SamInside (*.hashes) project files. This format is similar to text PWDUMP, but it is more flexible and uses the 0х7f character instead of the colon, which is more reasonable.
  • PasswordPro project files (*.hashes). This format is similar to text PWDUMP, except several changes. It is used by PasswordsPro product.
  • Passcape Universal Configuration Files (*.puc). This container is used in Reset Windows Password software and can contain several different dumps.
  • Plain hashes (*.*). Raw hashes in plain text format (32 or 16 characters in a line).
After importing hashes, the program automatically marks all the LM or NT hashes and launches the preliminary attack. This action is optional and can be disabled in the general settings. This option is enabled by default.