I've already removed most of the registry entries claimed by the SpyHunter tool manually (I did not want to buy this software, as I did not know if it really works for this type of virus) - but I've made a backup of a few of the registry entries.
Can you give a more detailed information about which files / registry keys you check and the algorithm the crypter uses? I've the storage.bin file and a few registry entry backups which may be relevant.
Would you mind posting the source code of your tool? This would be great!
Thanks,
Andreas.
If you have a backup of your storage.bin then load it in my decryptor (click on Load data file and set the path to this file) and you will see if the decryption key is still there.
My tool checks the known locations of data files and registry entries
%appdata%\key.dat
%localappdata%\storage,bin
[HKCU\Software\Microsoft\Windows\CurrentVersion\SET]
[HKCU\Software\Microsoft\Windows\CurrentVersion\Settings\storage]
Sorry, but I don't want to post source code because Tesla/Alpha crypt writers can use it against you all. My decoder is written in masm so if you disassemble it (IDA, ollydbg) you will get the source code (almost).
Your decryptor posts following message when I direct 'load data file' to my storage.bin backup:
Data file version 4 recognized.
ERROR - Decryption key is not present in data file.
Unfortunatelly this tool can't recover decryption key. :-(
The registry keys you mentioned, I did not modify, but they do not exist.
If your tool fails, and you say 'see if the decryption key is still there', does this mean that the virus destroys the decryption key if you either do not pay and let the warning time run out, or if you try to remove/stop the virus?
My backup of storage.bin is made after the time I tried to remove the virus manually - I had the problem that Windows crashed with a blue screen and I could boot only in safe mode or in Windows Debug Mode. In this Debug Mode I the first time saw this virus' encryption warning, still claiming about 75 hours and started research about this kind of virus. This is now less than 48 hours ago, but as already mentioned I tried to stop this virus manually, by deleting some registry keys and renaming suspicious exe files.
Andreas.