Home

Awesome

It's based on the content of the book - Practical Malware Analysis (http://115.com/file/anc1bhs7)

The detailed explanation is on this site: http://bbs.pediy.com/showthread.php?t=153508