Код:
begin
ClearQuarantine;
ShowMessage('Внимание! Перед выполнением скрипта AVZ автоматически закроет все сетевые подключения.' + #13#10 + 'После перезагрузки компьютера подключения к сети будут восстановлены в автоматическом режиме.');
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
SearchRootkit(true, true);
SetAVZGuardStatus(True);
TerminateProcessByName('c:\WINDOWS\jodrive32.exe');
TerminateProcessByName('c:\WINDOWS\aadrive32.exe');
QuarantineFile('c:\WINDOWS\jodrive32.exe', 'MBAM: Trojan.Agent');
QuarantineFile('c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013\ecleaner.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\all users\документы\avz4\Infected\2011-08-29\avz00001.dta', 'MBAM: Trojan.Downloader');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\k[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\P43[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[10].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[11].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[2].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[3].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[4].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[5].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[6].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[7].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[8].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[9].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\h[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\h[2].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\h[3].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\h[4].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\o43[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\P43[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\t[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\t[2].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\t[3].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\t[4].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\t[5].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVAPY5KB\v43[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVUDKTEJ\di43[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVUDKTEJ\h[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVUDKTEJ\k[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVUDKTEJ\P43[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVUDKTEJ\P43[2].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVUDKTEJ\t[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\MVUDKTEJ\t[2].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\h[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\h[2].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\h[3].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\h[4].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\k[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\P43[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[1].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[2].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[3].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[4].exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\acms.exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\nhz.exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\10.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\11.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\12.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\13.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\14.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\15.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\16.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\17.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\18.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\19.tmp', 'MBAM: Trojan.Downloader');
QuarantineFile('c:\documents and settings\Work\application data\1A.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\1B.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\1C.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\1D.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\1E.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\1F.tmp', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\Work\application data\20.tmp', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\Work\application data\21.tmp', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\Work\application data\23.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\24.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\25.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\26.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\28.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\29.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\2B.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\2C.tmp', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\Work\application data\51.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\52.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\54.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\7.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\8.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\9.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\A.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\work\application data\vgaeaz.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\Work\application data\B.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\work\application data\biaeaf.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\Work\application data\C.tmp', 'MBAM: Trojan.Agent');
QuarantineFile('c:\documents and settings\Work\application data\D.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\E.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\application data\F.tmp', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\7LR1D2UE\296172024[1].gif', 'MBAM: Extension.Mismatch');
QuarantineFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\820WHCAP\2000few[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\CJLZR8MU\522464163[1].gif', 'MBAM: Extension.Mismatch');
QuarantineFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\V2LJFG72\ngk[1].exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\program files\WinRAR\KGWINRAR.EXE', 'MBAM: Trojan.Agent.CK');
QuarantineFile('c:\RECYCLER\kos-2-3-41-0000010000-0000010000-0000010000-0100\wincache.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\00.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\01.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\03.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\04.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\05.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\07.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\08.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\10.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\12.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\14.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\15.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\16.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\23.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\25.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\26.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\27.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\32.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\33.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\34.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\35.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\36.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\38.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\41.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\42.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\45.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\46.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\50.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\52.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\56.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\57.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\61.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\64.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\67.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\68.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\70.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\73.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\75.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\76.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\78.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\81.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\82.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\83.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\84.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\85.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\87.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\system32\88.exe', 'MBAM: Spyware.BlackShadesNET');
QuarantineFile('c:\WINDOWS\aadrive32.exe', 'MBAM: Backdoor.IRCBot');
QuarantineFile('c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1830\zaberg.exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\syitm.exe', 'MBAM: Worm.Dorkbot');
QuarantineFile('c:\WINDOWS\system32\ac32.exe', 'MBAM: Trojan.Agent');
QuarantineFile('c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\Desktop.ini', 'MBAM: Worm.AutoRun');
QuarantineFile('c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013\Desktop.ini', 'MBAM: Worm.AutoRun.Gen');
QuarantineFile('c:\RECYCLER\kos-2-3-41-0000010000-0000010000-0000010000-0100\Desktop.ini', 'MBAM: Trojan.Palevo');
DeleteFile('c:\WINDOWS\jodrive32.exe');
DeleteFile('c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013\ecleaner.exe');
DeleteFile('c:\documents and settings\all users\документы\avz4\Infected\2011-08-29\avz00001.dta');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\k[1].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\P43[1].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[10].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[11].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[1].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[2].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[3].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GHEBM7YR\t[4].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\h[2].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\h[3].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\h[4].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\k[1].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\P43[1].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[1].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[2].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[3].exe');
DeleteFile('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\O18N6LUL\t[4].exe');
DeleteFile('c:\documents and settings\Work\acms.exe');
DeleteFile('c:\documents and settings\Work\nhz.exe');
DeleteFile('c:\documents and settings\Work\application data\10.tmp');
DeleteFile('c:\documents and settings\Work\application data\11.tmp');
DeleteFile('c:\documents and settings\Work\application data\12.tmp');
DeleteFile('c:\documents and settings\Work\application data\13.tmp');
DeleteFile('c:\documents and settings\Work\application data\14.tmp');
DeleteFile('c:\documents and settings\Work\application data\15.tmp');
DeleteFile('c:\documents and settings\Work\application data\16.tmp');
DeleteFile('c:\documents and settings\Work\application data\17.tmp');
DeleteFile('c:\documents and settings\Work\application data\18.tmp');
DeleteFile('c:\documents and settings\Work\application data\19.tmp');
DeleteFile('c:\documents and settings\Work\application data\1A.tmp');
DeleteFile('c:\documents and settings\Work\application data\1B.tmp');
DeleteFile('c:\documents and settings\Work\application data\1C.tmp');
DeleteFile('c:\documents and settings\Work\application data\1D.tmp');
DeleteFile('c:\documents and settings\Work\application data\1E.tmp');
DeleteFile('c:\documents and settings\Work\application data\1F.tmp');
DeleteFile('c:\documents and settings\Work\application data\20.tmp');
DeleteFile('c:\documents and settings\Work\application data\21.tmp');
DeleteFile('c:\documents and settings\Work\application data\23.tmp');
DeleteFile('c:\documents and settings\Work\application data\24.tmp');
DeleteFile('c:\documents and settings\Work\application data\25.tmp');
DeleteFile('c:\documents and settings\Work\application data\26.tmp');
DeleteFile('c:\documents and settings\Work\application data\28.tmp');
DeleteFile('c:\documents and settings\Work\application data\29.tmp');
DeleteFile('c:\documents and settings\Work\application data\2B.tmp');
DeleteFile('c:\documents and settings\Work\application data\2C.tmp');
DeleteFile('c:\documents and settings\Work\application data\51.tmp');
DeleteFile('c:\documents and settings\Work\application data\52.tmp');
DeleteFile('c:\documents and settings\Work\application data\54.tmp');
DeleteFile('c:\documents and settings\Work\application data\7.tmp');
DeleteFile('c:\documents and settings\Work\application data\8.tmp');
DeleteFile('c:\documents and settings\Work\application data\9.tmp');
DeleteFile('c:\documents and settings\Work\application data\A.tmp');
DeleteFile('c:\documents and settings\work\application data\vgaeaz.exe');
DeleteFile('c:\documents and settings\Work\application data\B.tmp');
DeleteFile('c:\documents and settings\work\application data\biaeaf.exe');
DeleteFile('c:\documents and settings\Work\application data\C.tmp');
DeleteFile('c:\documents and settings\Work\application data\D.tmp');
DeleteFile('c:\documents and settings\Work\application data\E.tmp');
DeleteFile('c:\documents and settings\Work\application data\F.tmp');
DeleteFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\7LR1D2UE\296172024[1].gif');
DeleteFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\820WHCAP\2000few[1].exe');
DeleteFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\CJLZR8MU\522464163[1].gif');
DeleteFile('c:\documents and settings\Work\local settings\temporary internet files\Content.IE5\V2LJFG72\ngk[1].exe');
DeleteFile('c:\RECYCLER\kos-2-3-41-0000010000-0000010000-0000010000-0100\wincache.exe');
DeleteFile('c:\WINDOWS\system32\00.exe');
DeleteFile('c:\WINDOWS\system32\01.exe');
DeleteFile('c:\WINDOWS\system32\03.exe');
DeleteFile('c:\WINDOWS\system32\04.exe');
DeleteFile('c:\WINDOWS\system32\05.exe');
DeleteFile('c:\WINDOWS\system32\07.exe');
DeleteFile('c:\WINDOWS\system32\08.exe');
DeleteFile('c:\WINDOWS\system32\10.exe');
DeleteFile('c:\WINDOWS\system32\12.exe');
DeleteFile('c:\WINDOWS\system32\14.exe');
DeleteFile('c:\WINDOWS\system32\15.exe');
DeleteFile('c:\WINDOWS\system32\16.exe');
DeleteFile('c:\WINDOWS\system32\23.exe');
DeleteFile('c:\WINDOWS\system32\25.exe');
DeleteFile('c:\WINDOWS\system32\26.exe');
DeleteFile('c:\WINDOWS\system32\27.exe');
DeleteFile('c:\WINDOWS\system32\32.exe');
DeleteFile('c:\WINDOWS\system32\33.exe');
DeleteFile('c:\WINDOWS\system32\34.exe');
DeleteFile('c:\WINDOWS\system32\35.exe');
DeleteFile('c:\WINDOWS\system32\36.exe');
DeleteFile('c:\WINDOWS\system32\38.exe');
DeleteFile('c:\WINDOWS\system32\41.exe');
DeleteFile('c:\WINDOWS\system32\42.exe');
DeleteFile('c:\WINDOWS\system32\45.exe');
DeleteFile('c:\WINDOWS\system32\46.exe');
DeleteFile('c:\WINDOWS\system32\50.exe');
DeleteFile('c:\WINDOWS\system32\52.exe');
DeleteFile('c:\WINDOWS\system32\56.exe');
DeleteFile('c:\WINDOWS\system32\57.exe');
DeleteFile('c:\WINDOWS\system32\61.exe');
DeleteFile('c:\WINDOWS\system32\64.exe');
DeleteFile('c:\WINDOWS\system32\67.exe');
DeleteFile('c:\WINDOWS\system32\68.exe');
DeleteFile('c:\WINDOWS\system32\70.exe');
DeleteFile('c:\WINDOWS\system32\73.exe');
DeleteFile('c:\WINDOWS\system32\75.exe');
DeleteFile('c:\WINDOWS\system32\76.exe');
DeleteFile('c:\WINDOWS\system32\78.exe');
DeleteFile('c:\WINDOWS\system32\81.exe');
DeleteFile('c:\WINDOWS\system32\82.exe');
DeleteFile('c:\WINDOWS\system32\83.exe');
DeleteFile('c:\WINDOWS\system32\84.exe');
DeleteFile('c:\WINDOWS\system32\85.exe');
DeleteFile('c:\WINDOWS\system32\87.exe');
DeleteFile('c:\WINDOWS\system32\88.exe');
DeleteFile('c:\WINDOWS\aadrive32.exe');
DeleteFile('c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1830\zaberg.exe');
DeleteFile('c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\syitm.exe');
DeleteFile('c:\WINDOWS\system32\ac32.exe');
DeleteFile('c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\Desktop.ini');
DeleteFile('c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013\Desktop.ini');
DeleteFile('c:\RECYCLER\kos-2-3-41-0000010000-0000010000-0000010000-0100\Desktop.ini');
DeleteFileMask('c:\RECYCLER', '*.*', true);
DeleteFileMask('c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5', '*.*', true);
BC_ImportAll;
ExecuteSysClean;
BC_Activate;
ExecuteWizard('TSW',2,2,true);
RebootWindows(true);
end.