Windows 10: Can I Operate Pc Normally After removal Of Virus .jdyi But No Decryption Of Data?

Discus and support Can I Operate Pc Normally After removal Of Virus .jdyi But No Decryption Of Data? in AntiVirus, Firewalls and System Security to solve the problem; I recently had a virus attack from the family STOP Djvu virus which encrypted all my files and changed the extension to .jdyi.The virus is of online ID... Discussion in 'AntiVirus, Firewalls and System Security' started by AbhangMane, Nov 5, 2020.

  1. Can I Operate Pc Normally After removal Of Virus .jdyi But No Decryption Of Data?


    I recently had a virus attack from the family STOP Djvu virus which encrypted all my files and changed the extension to .jdyi.The virus is of online ID and cannot be decrypted.There is no solution out there other than just removal of virus.After removal is it safe to operate the pc as for normal usages?

    Is it sure the virus is removed and not spreading further and i can operate my pc other than accessing files encrypted?

    Do you recommend using any specific antivirus for its removal and what can you say on this problem?

    After removal of virus can i factory reset the pc and start from new without any problem?

    :)
     
    AbhangMane, Nov 5, 2020
    #1
  2. Jsssssssss, Nov 5, 2020
    #2
  3. Solaris17 Win User
    Guide: Virus Removal 101

    Software and Background
    In this section we will briefly go over the software being used and why we chose this software as opposed to other options. This is more of an academic type of post that will clarify the more important "WHY" when it comes to removal. It is important to understand that in order to effectively remove or have the best chance too remove a virus you must have the proper tools. The software listed below is based on several key points. Those mostly being.
    • Free
    • Easy to use
    • Minimal user interaction
    • Update friendly
    At no point should you think that the software chosen was chosen because it is better than xyz or the "Best". That doesn't mean the software is "not the best" just that I am trying to break the mindset of "Best" it is important to shake the idea that a one off solution is always going to be the better one.

    A Porsche is fast and will get you to work sooner than an 18 wheeler but if your hauling tractors to work the 18 wheeler is better suited. This is no different in the security world applications are built for a specific purpose for the most part and because of the nature of heuristic code engines some software will do better than others even if it is the same area of interest.

    Software List
    - Threat Restraint
    • Rkill
    -Rootkit Removers
    • TDSS
    • bootkitremover
    • MBAR
    -Broad Spectrum Scanners
    • Roguekiller
    • EEK
    • MBAM
    • Sophos VRT
    • HitmanPro
    - Malware/Junkware Removers
    • ADWCleaner
    • JRT
    -Targeted Repairs
    • Powerliks
    • Combofix
    -Wrap-up and Repair
    • TWEAK
    • REVOuninstaller
    • Ccleaner
    Examples

    Above is the list of software this guide will cover and what you will be using to disinfect the machine in question. Now; we will go more into why we separate them into groups in the next section. Here I will explain weakness and strength between software types and programs so you can understand why there are so many.

    A common question is why don't we have a 1 all solution paid or otherwise that can handle all of well...all of this. The answer is simple.

    You can't.

    Every virus removal tool is different in some way. Some are able to detect things others can not. Above are the groups of different software. For example EEK is a broad spectrum scanner. However EEK cannot detect rootkits as well as programs specifically designed to remove rootkits like TDSS. Likewise Programs like TDSS are completely incapable of detecting malware, it simply isn't programmed for it.

    Software in the same category also behaves differently. Hitman is very good at detecting browser issues and cookies. However Sophos isn't so great at browser infections but is better at scanning core system folders.

    The AV world is full of these kinds of checks and balances which makes proper removal more of a skill than a click of a few buttons. Nothing is 100% and you must rely on the differences the tools have to increase your chances of success.

    - Running scans in order

    Running scans in the correct order might be something you are unfamiliar with. I will try to break down the basic concept as to why this is important to you. For the most part it boils down to permissions. Be it actual NTFS permissions or actual Privilege. Digging deeper you should ALWAYS attack an infection in this order.
    • Threat restraint
    Threat restraint is an important step because it will allow you the user to more easily work with your machine which is probably super slow because of infection. Using programs like killemall or Rkill stop known malware processes which free up memory and CPU making it a little easier and faster to deal with your machine.
    • Root/Boot Kits
    As previously covered Root and Bootkits are low level infections that grant admin (root) access to the machine. This software also for the most part changes permissions of core system files in order to more easily control your machine. It is very important to target and remove these infections first because the modifications they make can stop other higher level removal tools from working correctly.
    • Virus Scans
    Actual Virus removal comes next. Trojans, worms, spyware all virus class infections cause some kind of issues with system services, built in security protection and have the ability to prevent removal tools from opening. These kinds of infections need to be delt with second so that we can ease the restraints on the system so that our tools have the proper permissions and resources to run.
    • Mal/Junkware scans
    These are the last class of tools to run. These infections usually adhere to the user level of least privilege. They are really annoying and bothersome but are usually the most simple to remove. Unfortunately the tools that remove them require the use of system resources most of the time and assume they have everything they need to proceed. For this reason malware and junkware removal scans are done last because they totally rely on the previous steps being done and corrected to run correctly.
    • Repair
    Repair tools like tweak are used last. These programs reset windows to a default usable state. From folder options and icon size to default services and program startup. Most of the virus removal tools correct security related issues that the virus they are removing affected.

    However sometimes more things have been touched and damaged and for these we use repair software last to correct the remaining issues after a full removal.
     
    Solaris17, Nov 5, 2020
    #3
  4. Can I Operate Pc Normally After removal Of Virus .jdyi But No Decryption Of Data?

    Jsssssssss, Nov 5, 2020
    #4
Thema:

Can I Operate Pc Normally After removal Of Virus .jdyi But No Decryption Of Data?

Loading...
  1. Can I Operate Pc Normally After removal Of Virus .jdyi But No Decryption Of Data? - Similar Threads - Operate Normally removal

  2. How can I remove this virus?

    in Windows 10 Gaming
    How can I remove this virus?: My mom was the first to notice. For some reason, my folders keep opening, and the Microsoft Edge keeps making new tabs constantly, that go to "How to get help with windows 11" or "what can the new bing chat do?"I'm not pressing anything on my keyboard, and I have scanned...
  3. How can I remove this virus?

    in Windows 10 Software and Apps
    How can I remove this virus?: My mom was the first to notice. For some reason, my folders keep opening, and the Microsoft Edge keeps making new tabs constantly, that go to "How to get help with windows 11" or "what can the new bing chat do?"I'm not pressing anything on my keyboard, and I have scanned...
  4. my laptop virus attack and my all data encrypted how to decrypted data

    in Windows 10 Software and Apps
    my laptop virus attack and my all data encrypted how to decrypted data: ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This...
  5. Bitlocked encrypted data is Unable to decrypt after transferring data From Pc to Harddisk?

    in AntiVirus, Firewalls and System Security
    Bitlocked encrypted data is Unable to decrypt after transferring data From Pc to Harddisk?: hello,The details goes as follows:I Encrypted my E: drive on my Lenovo laptop on windows 10 and a few years back i changed my laptop. so i transferred my whole data in my hard disk. Similarly following the basic steps of Encryption of my Drive E: , I Entered my bitlocker...
  6. How can I decrypt the files infected with a Virus

    in AntiVirus, Firewalls and System Security
    How can I decrypt the files infected with a Virus: Hello Community,Please I need helpSuddenly my all files were encrypted with .sspq extension after downloading a software contains virus. I am using windows 8. These are really important files for me I dont want to lose them. I can't access the files now. I have tried...
  7. I Have been Infected with Virus and My File Changed to JDYI a

    in AntiVirus, Firewalls and System Security
    I Have been Infected with Virus and My File Changed to JDYI a: I need help. All my files have been corrupted and they read as JDYI files. I don't know what to do. My windows security is also blank. I have no anti-virus to help. [Original Title: JDYI Virus]...
  8. JDYI Virus

    in AntiVirus, Firewalls and System Security
    JDYI Virus: I need help. All my files have been corrupted and they read as JDYI files. I don't know what to do. My windows security is also blank. I have no anti-virus to help. https://answers.microsoft.com/en-us/protect/forum/all/jdyi-virus/965c394e-9355-4ec0-a1d4-cab69f283535
  9. Laptop is infected by .jdyi virus

    in AntiVirus, Firewalls and System Security
    Laptop is infected by .jdyi virus: While installing nitro pdf a maleware is installed in my computer. All pdf, docx, xlx file are encrypted and renamed with extra .jdyi extention at the end. They are asking 980 USD to open all the file. When I rename those file by simply remane back to .pdf, those files are...
  10. decrypt data

    in Windows 10 Network and Sharing
    decrypt data: Dear frind . i was encrypted my External hard driver when i used windows 7 then reinstall windows 7 and i install windows 10, and when i tray to open my External hard driver aging i found all my work file and folder are not opening, word and expel and work pic and privet...