Home > Products > Windows Passwords > Windows Password Recovery > Screenshots > Loading hashes > Other programs
Loading password hashes from other programs
Reset Windows Password v12.0
Windows media forensic tools and improved interface
Reset Windows Password v11.4
Windows activity timeline, Windows clipboard history, etc.
Windows Password Recovery v14.3
Preliminary support for Windows 11
Outlook Password Recovery v3.2.1
Support for Windows 11 and the latest version of MS Outlook

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Windows Password Recovery - loading hashes from other programs


Importing password hashes from other programs

 Finally, you can load the hashes to your project by importing them from other applications. The software supports the following formats:

  • PWDUMP - despite many disadvantages, this is a de facto standard format for storing password hashes. Important note: This format does not fully support national characters. Therefore, some usernames or comments may not display correctly. Windows Password Recovery also supports textual PWDUMP files in UNICODE.
  • L0phtCrack (*.lcs) - this file format is used by the LophtCrack software. The program supports all versions of LCS files, beginning with v4.
  • .hdt project files, which are used by Proactive Password Auditor (used to be PWSEX) from ElcomSoft. All versions of the format are supported, beginning with v3.
  • *.hsh files, which are exported by Proactive System Password Recovery from the same notorious company.
  • *.lst hash lists, created by Cain & Abel. Windows Password Recovery supports *.lst files beginning with v.4.9.12. The earlier versions of LST files used the ';' delimiter instead of 'TAB'. Unfortunately, the LST file does not have a marker that specifies the version; therefore, if the LST file is unreadable, you may have to manually replace all the field delimiters with the 'TAB'.
  • *.winpsw files, created by WinPassword, from good old LastBit. Supports all versions of WINPSW, beginning with v6.
  • SamInside (*.hashes) project files. This format is similar to text PWDUMP, but it is more flexible and uses the 0х7f character instead of the colon, which is more reasonable.
  • PasswordPro project files (*.hashes). This format is similar to text PWDUMP, except for several changes. It is used by the PasswordsPro product.
  • Passcape Universal Configuration Files (*.puc). This container is used in Reset Windows Password software and can contain several different dumps.
  • Plain hashes (*.*). Raw hashes in plain text format (32 or 16 characters in a line).
  • Passcape export/import files (*.peif). This format holds domain cached credentials and is used by Passcape software. For example, in Network Password Recovery.
  • Elcomsoft PSPR files (*.dcc). Textual files that contain domain cached credentials.
  • CACHEDUMP files (*.txt or *.cachedump). A standard placeholder for domain cached credentials (type 1). This format is obsolete.
  • John The Ripper DCC2 files (*.txt). A DCC2 hash format is used in John The Ripper.
  • Password backup files (*.zip) created by Reset Windows Password. The password backups can be created in a free edition of the password backup tool. If the program detects that the backup is protected, you will be prompted to type in the archive password in order to be able to access the files.
After importing hashes, the program automatically marks all the LM or NT hashes and launches the preliminary attack. This action is optional and can be disabled in general settings. This option is enabled by default.