You could probably do elbandi's solution just using a text file if you don't want do code it (and it probably would be faster):
1. dump the address list/dump the wallet
2. Copy the results and open in a text file.
3. Insert dumpprivkey in front of each line using your text editors commands to do it for every line. In Unix it is pretty easy and in many other editors too.
4. Copy and paste results into the console, and I would think it would execute each line - I haven't tried and am not in front of it to try it.
5. Copy the results of the dumpprivkey list.
6. Edit as needed to reimport into a new wallet.
Then you would not have to do each one individually. If pasting into console doesn't work, you could always try sending each via RPC automatically with a script.
I do not believe that the password is stored in memory after the wallet is unlocked. I thought I read this during the heartbleed bug discussion, but have not verified it.
I'd imagine it would have to be... otherwise you'd need to enter the password to re-lock it.
I got some help on reddit and have been doing some testing and it's not looking good.
But I really want to thank everyone who suggested that I do the things that I already know are options, and those who are insisting that I export those keys RIGHT NOW, as if I havent yet done it.
Let me be clear then: I HAVE ALREADY exported the keys. No kidding. Thats the only backup I have.
I was asking to see if there was an EASIER WAY than manually rebuilding the wallet, AND IN ADDITION, being able to recover the 81 LTC. Not sure why you ask a very specific question, and you get tons of people telling you to do something else.
I know. Export the keys. Save the bitcoin in them. I know that.
My QUESTION was about recovering the passphrase, to both make this easier, and save the LTC.