|  | 
			
	
		| AIM version 6.x (till v7.2) onwards stores the 
		password at the following registry location, | 
			
	 |  | 
	
		| HKEY_CURRENT_USER\Software\America 
		Online\AIM6\Passwords | 
			
	 |  | 
			
	
		| AIM PRO version uses the different 
		registry location to store the passwords, 
 | 
			
	 |  | 
			
	
		| HKEY_CURRENT_USER\Software\AIM\AIMPRO\<Account_Name> 
 | 
			
		 |  | 
			
	
		|  Latest version of AIM (v7.5 since v7.3) stores the 
		encrypted username/password in the file 'aimx.bin' at 
		following location | 
			
		 |  | 
			
	
		| [Windows XP] C:\Documents and Settings\<user_name>\Local Settings\Application 
		Data\AIM
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\<user_name>\AppData\Local\AIM
 | 
			
	 |  | 
			
	
		| AIM uses Blowfish encryption algorithm along with 
		Base64 encoding to securely store the login passwords. You can use our FREE tool, 
		AIM Password Decryptor to recover the password 
		saved by all versions of AIM (including latest version v7.5). 
		 | 
			
	 |  | 
	
			
	
		|  Related Tools: Messenger Password Decryptor | 
			
	
			
	
		|  | 
	
		|  | 
		
	
			
		 |  | 
			
				
	
		| Beyluxe Messenger stores main account password 
		at following registry location 
 | 
			
	 |  | 
			
	
		| HKEY_CURRENT_USER\Software\Beyluxe Messenger\<nick_name> | 
			
		 |  | 
			
	
		| Password for each user is encrypted and stored in the 
		registry value 'password' under this key. You can recover all 
		such stored account 
		passwords by Beyluxe Messenger using 
		Messenger Password Decryptor
		
		 | 
			
			
	
		|  Related Tools:  Messenger Password Decryptor | 
			
	
	
		|  | 
	
		|  | 
	
	
	
	
		
	
			
		 |  | 
			
		| BigAnt Messenger (version 2.82) stores the login name and password 
		at following registry location, 
 | 
			
	 |  | 
			
	
		| HKEY_CURRENT_USER\Software\BigAntSoft\BigAntMessenger\Setting | 
			
		 |  | 
			
	
		| Login name is stored in the registry value "LoginName" 
		and encrypted password is stored in the registry value 'Password' 
		under this key. We will update more details about its encryption method 
		once we crack it down. | 
			
 |  | 
			
	
		|  Related Tools:  Messenger Password Decryptor | 
			
	
	
		|  | 
	
		|  | 
	
    
    
    
    
		
	
			
		 |  | 
			
		| Camfrog Video Messenger (version 6.2) stores the  login password 
		at following registry location, 
 | 
			
	 |  | 
			
	
		| HKEY_CURRENT_USER\Software\Camfrog\Client\<user_name>\ProfileInfo | 
			
		 |  | 
			
	
		| Here <user_name> refers to nick name or login name of the user. Hashed password is stored in registry value "Hash1" under this key. | 
			
 |  | 
			
	
		|  Related Tools:  Messenger Password Decryptor | 
			
	
	
		|  | 
	
		|  | 
	
    
    
    
    
	
		
	
			
		 |  | 
			
	
		| Newer versions of Digsby (Build 83 - r27225 as 
		of this writing) stores main account password in the 'logininfo.yaml' 
		file at following location, 
 | 
			
	 |  | 
			
	
		| [Windows XP] C:\Documents and 
		Settings\<user_name>\Local Settings\Application Data\Digsby
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\<user_name>\AppData\Local\Digsby
 
 | 
			
	 |  | 
			
	
		| Digsby stores only main account password 
		locally and all other IM account passwords (such as Yahoo, Gmail, AIM) 
		are stored in the servers. Main Digsby password is encrypted using 
		special algorithm with username, windows product id, install date as key and 
		resulting password is then encoded with BASE64 before storing into the 
		above password file. 
 Earlier versions of Digsby used to save the 
		password in the 'Digsby.dat' file at following location,
 
 | 
			
	 |  | 
			
	
		| [Windows XP] C:\Documents and 
		Settings\<user_name>\Application Data\Digsby
 
 [Windows Vista & Windows 
		7]
 C:\Users\<user_name>\AppData\Roaming\Digsby
 
 | 
			
	 |  | 
			
	
		| Earlier Digsby versions used hardcoded string 'foo' as key without BASE64 encoding. You can use 
		Digsby Password Decryptor to instantly 
		recover Digsby password for all versions. | 
			
	
			 |  | 
	
		|  Related Tools:
		Digsby Password Decryptor,
		Messenger Password Decryptor 
 | 
			
			
	
		|  | 
		
		|  | 
	
	
		
	
			
		 |  | 
			
	
		| Google Talk (GTalk) stores all remembered 
		gmail account information at following registry location. | 
			
		 |  | 
			
	
		| HKEY_CURRENT_USER\Software\Google\Google 
		Talk\Accounts 
 | 
			
	 |  | 
			
	
		| For each Google account separate registry 
		key is created with the account email id as name under this key. Account 
		password is encrypted and stored in the registry string value named 'pw' 
		within this account registry key. You can use Google Password Decryptor 
		to instantly recover all stored 
		Google account passwords by Gtalk. | 
			
		 |  | 
	
	
		|  Related Tools:
		Google Password Decryptor, 
		Messenger Password Decryptor | 
			
	
			
	
		|  | 
			
		|  | 
	
	
	
		
	
			
		 |  | 
			
	
		| IMVU Messenger (version 450.2) stores the login 
		account information at following registry location, | 
			
	 |  | 
			
	
		| HKEY_CURRENT_USER\Software\IMVU\username HKEY_CURRENT_USER\Software\IMVU\password
 | 
			
		 |  | 
			
	
		| Username is stored in clear text and password is 
		stored in hex format as a default registry value. You can use 		Messenger Password Decryptor
		ttool to automatically & quickly recover the login account 
		password stored by IMVU messenger. | 
			
		 |  | 
			
	
		|  Related Tools:  Messenger Password Decryptor | 
			
	
		|  | 
	
	
		|  | 
	
	
	
		
	
			
		 |  | 
			
	
		| Meebo Notifier (beta version) stores the login 
		messenger account passwords in the 'MeeboAccounts.txt' 
		file at below mentioned location depending on your platform. | 
			
	 |  | 
			
	
		| [Windows XP] C:\Documents and Settings\Application Data\Meebo\MeeboAccounts.txt
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\AppData\Roaming\Meebo\MeeboAccounts.txt
 | 
			
		 |  | 
			
	
		| This "MeeboAccounts.txt" file contains username in clear text and
		login password encoded with magic bytes. You can use our 
		Meebo Password Decryptor or
		Online Meebo 
		Password Decoder to automatically and instantly recover all 
		the messenger passwords stored by Meebo Notifier. | 
			
		 |  | 
	
		|  Related Tools:  Meebo Password Decryptor, 
		Messenger Password Decryptor | 
			
	
		|  | 
	
	
		|  | 
	
	
	
		
	
			
		 |  | 
			
		
		| Miranda is open source based popular messenger of recent times. Like most instant messengers, 
			Miranda also stores the all user account information including 
			passwords in the profile location. This is to prevent the user from 
			entering the passwords each time. Latest version of Miranda 
			(v0.9.10) stores the user account & password in the profile file at 
			following location | 
		 |  | 
	
		| [Windows XP] C:\Documents and Settings\<user_name>\Application 
		Data\Miranda\%profile_name%\%profile_name%.dat
 
 [Windows Vista & 
		Windows 7]
 C:\Users\<username>\AppData\Roaming\Miranda\%profile_name%\%profile_name%.dat
 | 
	
		 |  | 
		 | User can have multiple profiles specific 
			to office or home environment and corresponding account information 
			is stored in the respective profile file. 
 Initial versions of 
			Miranda stored all account information in .dat file directly within 
			the base location as shown below,
 | 
 |  | 
			
	
		| [Windows XP] C:\Documents and 
		Settings\<user_name>\Application Data\Miranda\<profile_name>.dat
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\<user_name>\AppData\Roaming\Miranda\<profile_name>.dat
 
 | 
			
	 |  | 
			
	
		| Miranda uses its own proprietary mechanism to encrypt the password 
		before storing into the profile file. You can use 
		Miranda Password Decryptor to instantly recover 
		all stored account passwords by 
		Miranda.  | 
			
	 |  | 
	
	
			
	
		|  Related Tools:
		Miranda Password Decryptor,
		Messenger Password Decryptor 
 | 
			
		
	
		|  | 
		
	
		|  | 
	
	
	
		
	
		
	
			
	 |  | 
			
	
		| MSN Messenger also uses 'Credential Store' to securely store the remembered passwords. These passwords are stored 
		as type 'Domain Visible Network' aka '.Net Passport' using the target 
		name as '.Net passport' within the 'Credential Store'. You can recover all MSN 
		messenger stored passwords using 
		MSNLive Password Decryptor. | 
			
 |  | 
	
	
			
	
		|  Related Tools: 
		
		MSNLive Password Decryptor, 
		Messenger Password Decryptor
		,
		Network Password Decryptor | 
			
	
			
	
		|  | 
	
		|  | 
	
		
	
			
		 |  | 
			
	
		| MySpaceIM is one of the upcoming instant messenger which stores the 
		user account & password details at following location. | 
			
	 |  | 
			
	
		| [Windows XP] C:\Documents and 
		Settings\<user_name>\Application Data\MySpace\IM\users.txt
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\<user_name>\AppData\Roaming\MySpace\IM\users.txt
 
 | 
			
	 |  | 
			
	
		| The user login email id is stored in clear text where as the 
		password is in encrypted format. The password is encrypted using
		
		'Windows Crypto API' functions and then encoded using BASE64 
		algorithm beforing storing into this file. So in order to decrypt it 
		successfully one has to decode the password using BASE64 and then 
		decrypt it using
		
		CryptUnprotectData function. You can use 
		IM Password Decryptor to instantly recover stored account passwords by 
		MySpaceIM.  | 
			
	
			
 |  | 
	
		|  Related Tools:
		Messenger Password Decryptor | 
			
			
	
		|  | 
	
		|  | 
	
	
			
		
	
			
		 |  | 
			
	
		| Nimbuzz Messenger (version 1.6) stores the login 
		account information at following registry location, | 
			
	 |  | 
			
	
		| HKEY_CURRENT_USER\Software\Nimbuzz\PCClient\Application | 
			
		 |  | 
			
	
		| It stores all the account details including login username & 
		password (stored in hex format) in registry values "username" 
		& "password" respectively. 
 You can use
		
		Messenger Password Decryptor to automatically & quickly 
		recover the login account password stored by Nimbuzz.
 | 
			 |  | 
			
	
		|  Related Tools:  Messenger Password Decryptor | 
			
	
		|  | 
	
	
		|  | 
	
	
		
	
		
	
			
		 |  | 
			
	
		| PaltalkScene stores main account password 
		at following registry location 
 | 
			
	 |  | 
			
	
		| HKEY_CURRENT_USER\Software\Paltalk\<nick_name> | 
			
		 |  | 
			
	
		| Password is encrypted and stored in the 
		registry value 'pwd' under this key. All other IM passwords such as 
		Gmail, Yahoo, AIM etc are saved under separate sub keys under this 
		registry key. For example Gmail accounts are stored under following 
		registry key, | 
			
	 |  | 
	
		| HKEY_CURRENT_USER\Software\Paltalk\<nick_name>\GGL\<gmail_address> 
 | 
			
	 |  | 
			
	
		| All these IM passwords are encoded with BASE64 and stored in 'pwd' 
		registry value. You can recover main 
		password as well as all the IM passwords stored by Paltalk using 
		Paltalk Password Decryptor.
		 | 
			 |  | 
	
	
		|  Related Tools:  Paltalk Password Decryptor, 
		Messenger Password Decryptor | 
			
	
		|  | 
	
	
		|  | 
		
			
		
		
		
	
			
	 |  | 
			
	
		| Pidgin stores all configured account 
		passwords in the "Accounts.xml" file located at following directory 
 | 
			
	 |  | 
			
	
		| [Windows XP] C:\Documents and 
		Settings\<user_name>\Application Data\.purple
 
 [Windows Vista & 
		Windows 7]
 C:\Users\<username>\AppData\Roaming\.purple
 | 
			
		 |  | 
			
	
		| Older versions (Gaim) used .gaim folder 
		instead of .purple to store the account details. For each stored 
		account, 'Accounts.xml' file contains the <account> tag, which has sub 
		tags <name> & <password> containing the account email address and 
		password in plain text respectively. You can recover Pidgin 
		passwords using 
		Messenger Password Decryptor | 
			
	 |  | 
			
	
		|  Related Tools:
		Messenger Password Decryptor | 
			
			
	
		|  | 
	
		|  | 
			
	
		
	
			
	 |  | 
			
	
		| Skype does not store password directly. Instead 
		it stores the encrypted hash of the password in the 'config.xml'
		located 
		in Skype's user profile directory. Typical user profile directory for 
		Skype will be as follows, | 
			
	 |  | 
	
		| [Windows XP] C:\Documents and 
		Settings\<user_name>\Application Data\Skype\<account_name>
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\<username>\AppData\Roaming\Skype\<account_name>
 | 
			
	 |  | 
			
	
		| This config.xml contains <Credentials2> 
		tag which contains encrypted hash of the password. As per the research 
		paper 'Vanilla Skype' 
		written by Fabrice Desclaux and Kostya Kortchinsky, Skype uses the MD5 
		hash of string "username\nskyper\npassword" for authentication. If user 
		has set the 'Remember password' option then this MD5 hash is encrypted 
		using AES-256 & SHA-1 algorithms and finally saved into the 'Config.xml' 
		file. Since the HASH of the password is saved, it is not 
		possible to directly get the password. Instead one has to use dictionary 
		or brute force approach to find out the right password from the hash. 
		This approach may take days or months together based on the length & 
		complexity of the password.
		
		 You can use our 'Skype Password Recovery' to recover your lost or forgotten 
		Skype password.  | 
			
	 |  | 
			
	
		|  Related Tools:
		Skype Password Recovery | 
			
	
	
		|  | 
	
		|  | 
			
		
		
	
			
	 |  | 
			
	
		| Tencent QQ is one of the popular instant messenger 
		which stores the user's login information in the file 
		"Registry.db" at following location | 
			
	 |  | 
	
		| C:\Users\<user_name>\Documents\Tencent Files\<qq_login_id\QQ | 
			
	 |  | 
			
	
		| This "Registry.db" file is in the OLE storage format which can be 
		viewed using DocFile Viewer. However internal login information is 
		encrypted using Blowfish algorithm. | 
			
	 |  | 
			
	
		|  Related Tools:
		Messenger Password Decryptor | 
			
			
	
		|  | 
	
		|  | 
	
	
	
	
	
	
	
	
	
		
	
			
	 |  | 
			
	
		| [Version 4.21 build 24] - [Version 5.0.0.26] | 
			
	
		| Trillian Astra stores only main account passwords (called as 
		Identity or Astra password) in the 'accounts.ini' file at below 
		mentioned location. But all other IM account passwords (such as Yahoo, 
		Gtalk, AIM, MSN etc) are stored on the servers. 
 | 
			
	 |  | 
			
	
		| [Windows XP] C:\Documents and 
		Settings\<user_name>\Application Data\Trillian\users\global\
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\<username>\AppData\Roaming\Trillian\users\global\
 
 | 
			
	 |  | 
			
	
		| For each account it contains section named 
		'[Account<number>]" under which all information for that account is 
		stored. Username is stored in the field named 'Account=' and password is 
		stored in the field 'Password='. Trillian first performs XOR encoding of 
		the password with standard pattern and then encodes it with BASE64 
		before storing it.  You can use 
		Trillian Password Decryptor 
		to automatically recover passwords stored by all versions of Trillian. | 
			
 |  | 
			
	
		|  Related Tools:
		Trillian Password Decryptor,
		Messenger Password Decryptor | 
			
	
			
	
		|  | 
		
		|  | 
	
	
		
	
			
	 |  | 
			
	
		| Windows Live Messenger stores the account 
		password at 'Credential Store' which provides different mechanisms such 
		as 'Generic', 'Domain Network', 'Domain Visible Network' etc which 
		applications can use to store and retrieve their private credentials. 
		Each such method requires different technique and privilege level to 
		enumerate and decrypt the passwords. Windows Live Messenger 
		uses 'Generic Password'mechanism of 'Credential Store' to store the 
		passwords under the target name 'WindowsLive:name=<email_id>'.
		
		
		  You can use 
		MSNLive Password Decryptor to instantly recover all such passwords stored 
		by Live Messenger. | 
			
	 |  | 
			
	
		|  Related Tools:
		
		MSNLive Password Decryptor, 
		Messenger Password Decryptor
		,
		Network Password Decryptor | 
			
	
			
	
		|  | 
		
		|  | 
	
	
		
		
	
			
		 |  | 
			
	
		| Xfire is a free tool that automatically keeps track 
		of when and where gamers are playing games online with more than million 
		members. Xfire stores the user settings including login username & 
		password in a file "XfireUser.ini" at following 
		location, | 
			
	 |  | 
			
	
		| [Windows XP] C:\Documents and Settings\<user_name>\Application Data\Xfire
 
 [Windows Vista/Windows 7/Windows 8]
 C:\Users\<username>\AppData\Roaming\Xfire\
 
 | 
			
	 |  | 
			
	
		| Xfire uses blowfish encryption algorithm for both 
		username & password. Each encrypted Username is stored with the label
		"EncryptedUser1" and password is stored as 
		"EPW1". However Xfire does not store the original password 
		directly. Instead it generates the SHA1 hash of 
		username+password+"UltimateArena" and then store the encrypted 
		data of this SHA1 hash. You can use 
		Xfire Password Decryptor to instantly recover the login passwords from 
		Xfire. | 
			
	 |  | 
			
	
		|  Related Tools:
		Xfire Password Decryptor , HashKracker | 
			
			
	
		|  | 
	
		|  | 
			
	
		
	
			
	 |  | 
			
	
		| Yahoo Messenger prior to version 7 used to 
		store the password in the registry value 'EOptions String'
		at following 
		registry location, | 
			
		 |  | 
			
	
		| HKEY_CURRENT_USER\Software\Yahoo\Pager | 
			
	 |  | 
			
	
		| This password is encrypted and then encoded using 
		
		Yahoo64 
		(similar to Base64) algorithm and stored at above location. The actual 
		algorithm and encoding functionality is present in  ycrwin32.dll 
		(can be found in installed location of Yahoo Messenger). For version 7
		onwards, Yahoo stores the encrypted token derived from username & 
		password in 
		registry value 
		'ETS' at same registry location. Though you cannot 
		decrypt this token back to the password but you can copy it to another machine and continue to login to Yahoo 
		Messenger
		
		  | 
			
		
	
		|  Related Tools:
		
		Yahoo Password Decryptor | 
	
			
	
		|  | 
			
	
		|  |