Код:
begin
SearchRootkit(true, true);
SetAVZGuardStatus(True);
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
ClearQuarantineEx(true);
SetServiceStart('ewdmaudn', 4);
StopService('ewdmaudn');
QuarantineFile('','');
QuarantineFile('C:\Documents and Settings\арехи\Application Data\WindowDriverSys\dihitimu.exe','');
QuarantineFile('C:\DOCUME~1\2B1E~1\LOCALS~1\Temp\ewdmaudn.sys','');
QuarantineFile('C:\Documents and Settings\a?aoe\Application Data\WindowDriverSys\dihitimu.exe', 'MBAM: Trojan.Inject.ED');
QuarantineFile('C:\Documents and Settings\a?aoe\Application Data\WinSysDriv\res.zip', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 13 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 26 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 34 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 39 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 52 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 62 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 65 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 78 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 91 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 99 для res.zip\service.exe', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temporary Internet Files\Content.IE5\4JM07FNU\radeon[1].zip', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temporary Internet Files\Content.IE5\MFJ3JYAB\radeon[1].zip', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Documents and Settings\арехи\Local Settings\Temporary Internet Files\Content.IE5\XQ5ND7AT\radeon[1].zip', 'MBAM: PUP.Optional.Cgminer');
QuarantineFile('C:\Recycled\ctfmon.exe', 'MBAM: Trojan.VB');
QuarantineFile('C:\Recycled\Recycled\ctfmon.exe', 'MBAM: Trojan.VB');
QuarantineFile('C:\WINDOWS\system32\dp1.fne', 'MBAM: Worm.Autorun');
QuarantineFile('C:\WINDOWS\system32\internet.fne', 'MBAM: HackTool.Patcher');
QuarantineFile('F:\Recycled\ctfmon.exe', 'MBAM: Trojan.VB');
QuarantineFile('C:\WINDOWS\system32\com.run', 'MBAM: Trojan.Banker');
QuarantineFile('C:\WINDOWS\system32\eAPI.fne', 'MBAM: Worm.AutoRun');
QuarantineFile('C:\WINDOWS\system32\krnln.fnr', 'MBAM: Trojan.Agent');
QuarantineFile('C:\WINDOWS\system32\og.dll', 'MBAM: Worm.AutoRun');
QuarantineFile('C:\WINDOWS\system32\og.EDT', 'MBAM: Worm.AutoRun');
QuarantineFile('C:\WINDOWS\system32\RegEx.fnr', 'MBAM: Worm.AutoRun');
QuarantineFile('C:\WINDOWS\system32\shell.fne', 'MBAM: Worm.AutoRun');
QuarantineFile('C:\WINDOWS\system32\spec.fne', 'MBAM: Worm.AutoRun');
QuarantineFile('C:\WINDOWS\system32\ul.dll', 'MBAM: Worm.AutoRun');
DeleteFile('C:\Documents and Settings\a?aoe\Application Data\WindowDriverSys\dihitimu.exe');
DeleteFile('C:\Documents and Settings\a?aoe\Application Data\WinSysDriv\res.zip');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 13 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 26 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 34 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 39 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 52 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 62 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 65 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 78 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 91 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temp\Временная папка 99 для res.zip\service.exe');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temporary Internet Files\Content.IE5\4JM07FNU\radeon[1].zip');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temporary Internet Files\Content.IE5\MFJ3JYAB\radeon[1].zip');
DeleteFile('C:\Documents and Settings\арехи\Local Settings\Temporary Internet Files\Content.IE5\XQ5ND7AT\radeon[1].zip');
DeleteFile('C:\Recycled\ctfmon.exe');
DeleteFile('C:\Recycled\Recycled\ctfmon.exe');
DeleteFile('C:\WINDOWS\system32\dp1.fne');
DeleteFile('C:\WINDOWS\system32\internet.fne');
DeleteFile('F:\Recycled\ctfmon.exe');
DeleteFile('C:\WINDOWS\system32\com.run');
DeleteFile('C:\WINDOWS\system32\eAPI.fne');
DeleteFile('C:\WINDOWS\system32\krnln.fnr');
DeleteFile('C:\WINDOWS\system32\og.dll');
DeleteFile('C:\WINDOWS\system32\og.EDT');
DeleteFile('C:\WINDOWS\system32\RegEx.fnr');
DeleteFile('C:\WINDOWS\system32\shell.fne');
DeleteFile('C:\WINDOWS\system32\spec.fne');
DeleteFile('C:\WINDOWS\system32\ul.dll');
DeleteFile('C:\DOCUME~1\2B1E~1\LOCALS~1\Temp\ewdmaudn.sys','32');
DeleteFile('C:\Documents and Settings\арехи\Application Data\WindowDriverSys\dihitimu.exe','32');
RegKeyParamDel('HKEY_CURRENT_USER','Software\Microsoft\Windows\CurrentVersion\Run','WindowS32');
DeleteService('ewdmaudn');
BC_ImportAll;
ExecuteSysClean;
ExecuteWizard('SCU',2,2,true);
BC_Activate;
RebootWindows(true);
end.