Samplepedia
Samples
Solutions
Latest
Search
Courses
Ranking
Login
Trainings Samples
Samples
All Levels
easy
medium
advanced
expert
All Platforms
Windows
Linux
MacOS
iOS
Android
Multiple
Other
All Tags
acrstealer
agenttesla
almondrat
anti-dumping
anti-emulation
anti-vm
api hashing
apt
ast
autoit
autoruns
batch2exe
bloated
C++
c++
calling conventions
clean
cobal strike
config extraction
control flow
cryptbot
custom wrapper
cve-2018-0798
cypherit
d3f@ck
delphi
diffing
dinihou
disinfection
dll sideloading
dridex
emulation
encrypted
encryptedfile
evilai
external template
fastcall
findmain
game
gootloader
grayware
hooking
hta
injector
inno
installer
jpg
jphp
js
jvm
kopiluwak
legion
lgoogloader
lnk
loader
locky
lummastealer
macro
medusa
msoffice
.net
.netreactor
NetWire
nsis
obfuscated
obfuscation
office
openxml
packed
patched
pdf converter
pe metadata
peunion
poison
polymorphic
powershell
privateloader
process injection
purecrypter
pyinstaller
python
ransomnote
ransomware
rat
renpy
revil
revshell
screenlocker
scripting
self-modifying
shellcode
signature writing
smokedham
stage 1
stage 2
stage 3
stealer
steamhide
steganography
string deobfuscation
supply chain
triage
turla
upx
vba
vbs
vbscript
virus
virut
vsto add-in
windows
winupack
worm
wrapped
write unpacker
x64
x86
xworm
Yara
zpaq
Filter
Clear
SHA256
Author
Difficulty
Tags
Goal
Solutions
Likes
Comments
Created
29325e23a684f782db14a1bf0dc56c65228e666d1f561808413a735000de3515
struppigel
easy
loader
msoffice
external template
openxml
Where does this file load the next stage from?
2
2
0
20 Jan 2026