Most people know Kaspersky for its antivirus engine (and the geopolitical noise surrounding it). Few know about a small, standalone tool quietly sitting in their installation directory that can perform digital necromancy.
I’m talking about the ( kavrun.exe / restore.exe ).
The utility carves those fragments out of unallocated space, the pagefile, or even shadow copies, and reassembles them. Ransomware operates logically. It says: “Open File A → Encrypt contents → Write back to File A.”
| File Type | Ransomware A (Legacy) | Ransomware B (Modern, full-overwrite) | Ransomware C (Delete+TRIM) | | :--- | :--- | :--- | :--- | | Small .txt files | 92% recovery | 0% (overwritten) | 0% | | .jpg photos | 78% recovery | 12% (partial headers) | 3% (fragments) | | .docx (ZIP structure) | 65% recovery | 0% | 0% | | .pdf | 81% recovery | 8% | 1% |
Modern ransomware (post-2020) often uses the NtSetInformationFile with FileDispositionInfo to bypass the recycle bin. Some even call FSCTL_SET_ZERO_DATA to zero out clusters. The restore utility cannot recover what has been physically overwritten. Most people do this wrong. They run the tool on the infected system after the ransomware has been cleaned. That’s too late. Every second the system runs, the OS writes logs, updates, and temp files—overwriting the very sectors you want to carve.





