A forum for reverse engineering, OS internals and malware analysis 

Forum for announcements and questions about tools and software.
 #10425  by EP_X0FF
 Sat Dec 17, 2011 9:55 am
I think this is from CureIT with full virus database, because drweb32.dll (which is placed inside this Delphi written application) can't work without databases since engine <--> db relationships are hardcoded inside.
 #10456  by EP_X0FF
 Sun Dec 18, 2011 8:16 pm
This tool is based on drweb32.dll interface and actually all what it is doing - commands drweb engine to check specific file for viruses, while analysis it produce's temporary results and this tool save all of them. You can confirm that by looking on this Delphi (whatever) application code. FLY-CODE is a part of drweb engine - sort of heuristics based unpacker which main purpose produce unpacked code section for signature scan. This is not enough for unpacking packers/protectors etc in the full meaning of word "unpack" and can't be considered as generic unpacker as like for example QuickUnpack. As author at exelab mentioned due to heuristics approach FLY-CODE can be fooled and will produce complete trash as output. Have no idea why this Dr.Web component attracted such attention because such components implemented in different way exists in many other products, but no one do not considers them as "unpackers" are ready to use. It's fun tool, but useless.