It sounds like what you're trying to do is unethical and potentially illegal
A salt is a key-encryption, basically. That can be anything from XOr with a one time pad to cesar's encryption (shift by constant value (e.g. a=b, b=c.... z=a).
Like salt in food, using "salt" on a has is not essential but makes it much better. The good thing is, that you can't really over do it.
So what "salt" does, is to prevent reverse-engineering the passwords (bruteforce, rainbow tables). So in addition to the hash you also need to salt which is usually stored in the software itself.
You need the salt and the method of salting (as I said above, could be anything). Then you can "unsalt" that hash. But this only gives you the regular hash, not a password.
I don't think md5s are reversible. But you can always generate a hash like this by encrypting a text then comparing it. But the text you posted looks way too long
For reference, unsalted, tmto.org had the most extensive database last time I checked - there may be something better these days tho