Malware like Lumma often installs persistent backdoors. A clean reinstallation of Windows/your OS is generally the safest way to ensure the infection is removed. Technical Context for Recovery
It usually contains compressed data of found cryptocurrency wallet files (e.g., Jaxx, Exodus, MetaMask) and local storage databases from browsers like Chrome or Firefox.
The file is typically generated or downloaded by Lumma (LummaC2) malware after it has "scraped" your machine for digital assets.
Users often encounter this file name in their downloads or temp folders after running suspicious commands, such as mshta.exe links, which are a common infection vector. Recommended Urgent Actions
For those attempting to recover their own lost data from legitimate wallet backups, files like Jaxx local storage can often be found in AppData\Roaming\Jaxx\Local Storage on Windows. However, if Wallets-Full.7z appeared unexpectedly, it is not a "backup" you created, but a "package" created by an attacker. How did you this file on your system? Extracting the Jaxx 12-word wallet backup phrase - vxlabs
Disconnect from the internet to prevent further data exfiltration to the attacker's command-and-control server.