Awesome
It's based on the content of the book - Practical Malware Analysis (http://115.com/file/anc1bhs7)
The detailed explanation is on this site: http://bbs.pediy.com/showthread.php?t=153508
It's based on the content of the book - Practical Malware Analysis (http://115.com/file/anc1bhs7)
The detailed explanation is on this site: http://bbs.pediy.com/showthread.php?t=153508