Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (2014)
Chapter 4. Debugging and Automation
Appendix. Sample Names and Corresponding SHA1 Hashes
Chapter 4. Debugging and Automation
Appendix. Sample Names and Corresponding SHA1 Hashes