This document outlines a presentation on reverse engineering and reconstructing the Flamer malware framework. It begins by comparing typical malware to more advanced threats like Stuxnet and Flamer. It then discusses problems with reconstructing C++ code and identifying library code used by Flamer. An overview of the main object-oriented components in the Flamer framework is provided, including command executors, tasks, consumers, and delayed tasks. The document also looks at the Festi kernel-mode driver framework and Flamer's SQL database schema. It concludes by examining relationships between Stuxnet, Duqu, Flamer and Gauss in terms of source code bases and exploit implementations.