recover.exe

  • File Path: C:\Windows\system32\recover.exe
  • Description: Recover Files Utility

Hashes

Type Hash
MD5 FB2C06116CA9506829F08B8CAAE56561
SHA1 BB6745BDDE365BCF26FCA0727FF0541C3D173BDD
SHA256 DD8BC56FFB5B471B94F101C385439159B289BB9255A48EDD1F0C247F5101FDD7
SHA384 BC88FEF37801C34E43C59C8030068B4D947EDC790D2780451BD6FD46656B7A056ACF81A2422AF2F2C2C0F75B863BF11E
SHA512 430F9B8CD1B89C50DC77CA137368B391534312A278881D297E201C72F96D7BB6DFF51D84CBFE783A2F000EDBF0A049279180B66136551119B1242AC7DD2F4A4D
SSDEEP 192:EMp1/zPqoxJg1VD87N9EKVar3qy08VchbWSGS5Ajum2jWEnWy:BTRM7879UuyBVoVB62jWEnW
IMP 15EC0ACE85D3228ADCC66943670EF7D8
PESHA1 7755FF29ED30AE5989DD476939C43064DAC24309
PE256 F1AB60DD90A424DC9ADA815829F250267CABEEB2A094C3D0877122917A92000F

Runtime Data

Usage (stdout):

Recovers readable information from a bad or defective disk.

RECOVER [drive:][path]filename
Consult the online Command Reference in Windows Help
before using the RECOVER command.

Loaded Modules:

Path
C:\Windows\System32\KERNEL32.DLL
C:\Windows\System32\KERNELBASE.dll
C:\Windows\SYSTEM32\ntdll.dll
C:\Windows\system32\recover.exe

Signature

  • Status: Signature verified.
  • Serial: 3300000266BD1580EFA75CD6D3000000000266
  • Thumbprint: A4341B9FD50FB9964283220A36A1EF6F6FAA7840
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: Recover.Exe.MUI
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.19041.1 (WinBuild.160101.0800)
  • Product Version: 10.0.19041.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 64-bit

File Scan

  • VirusTotal Detections: 0/75
  • VirusTotal Link: https://www.virustotal.com/gui/file/dd8bc56ffb5b471b94f101c385439159b289bb9255a48edd1f0c247f5101fdd7/detection

File Similarity (ssdeep match)

File Score
C:\Windows\SysWOW64\recover.exe 30

Possible Misuse

The following table contains possible examples of recover.exe being misused. While recover.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma azure_keyvault_key_modified_or_deleted.yml - MICROSOFT.KEYVAULT/VAULTS/KEYS/RECOVER/ACTION DRL 1.0
sigma azure_keyvault_secrets_modified_or_deleted.yml - MICROSOFT.KEYVAULT/VAULTS/SECRETS/RECOVER/ACTION DRL 1.0
sigma proc_creation_win_sqlcmd_veeam_dump.yml - https://forums.veeam.com/veeam-backup-replication-f2/recover-esxi-password-in-veeam-t34630.html DRL 1.0
atomic-red-team T1048.003.md 3. Once the data is received, use the below command to recover the data. MIT License. © 2018 Red Canary
atomic-red-team T1110.002.md <blockquote>Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. OS Credential Dumping is used to obtain password hashes, this may only get an adversary so far when Pass the Hash is not an option. Techniques to systematically guess the passwords used to compute hashes are available, or the adversary may use a pre-computed rainbow table to crack hashes. Cracking hashes is usually done on adversary-controlled systems outside of the target network.(Citation: Wikipedia Password cracking) The resulting plaintext password resulting from a successfully cracked hash may be used to log into systems, resources, and services in which the account has access.</blockquote> MIT License. © 2018 Red Canary
atomic-red-team T1485.md RansomEXX malware removes all deleted files using windows built-in cipher.exe to prevent forensic recover. MIT License. © 2018 Red Canary

Additional Info*

*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.


recover

Recovers readable information from a bad or defective disk. This command reads a file, sector-by-sector, and recovers data from the good sectors. Data in bad sectors is lost. Because all data in bad sectors is lost when you recover a file, you should recover only one file at a time.

Bad sectors reported by the chkdsk command were marked as bad when your disk was prepared for operation. They pose no danger, and recover does not affect them.

Syntax

recover [<drive>:][<path>]<filename>

Parameters

Parameter Description
[<drive>:][<path>]<filename> Specifies the file name (and the location of the file if it is not in the current directory) you want to recover. Filename is required and wildcards aren’t supported.
/? Displays help at the command prompt.

Examples

To recover the file story.txt in the \fiction directory on drive D, type:

recover d:\fiction\story.txt

Additional References


MIT License. Copyright (c) 2020-2021 Strontic.