Samplepedia
Samples
Solutions
Latest
Search
Courses
Ranking
Login
Trainings Samples
Samples
All Levels
easy
medium
advanced
expert
All Platforms
Windows
Linux
MacOS
iOS
Android
Multiple
Other
All Tags
acrstealer
agenttesla
almondrat
anti-debug
anti-dumping
anti-emulation
anti-vm
api hashing
apt
ast
autoit
autoruns
batch2exe
bloated
C++
c++
calling conventions
clean
cobal strike
config extraction
control flow
cryptbot
curseforge
custom wrapper
CVE-2017-11882
cve-2018-0798
cypherit
d3f@ck
delphi
diffing
dinihou
discord
disinfection
dll sideloading
dridex
electron
emulation
encrypted
encryptedfile
evilai
exploit
external template
fastcall
findmain
forensics
game
godmode
godrat
gootloader
grayware
hooking
hta
injector
inno
installer
jar
java
javascript
jpg
jphp
js
jvm
kernel mode
kopiluwak
legion
lgoogloader
lnk
loader
locky
lummastealer
macro
matanbuchus
medusa
minecraft
modpack
msoffice
mythjs
.net
.netreactor
NetWire
nodejs
nsis
obfuscated
obfuscation
office
olelink
openxml
packed
patched
pdf converter
pe metadata
peunion
pkg
poison
polymorphic
powershell
privateloader
process injection
purecrypter
pyinstaller
python
ransomnote
ransomware
rat
renpy
revil
revshell
rootkit
screenlocker
scripting
self-modifying
shellcode
signature writing
smokedham
stage 1
stage 2
stage 3
stealer
steamhide
steganography
string deobfuscation
supply chain
triage
turla
upx
vba
vbs
vbscript
virus
virut
vsto add-in
windows
winupack
worm
wrapped
write unpacker
x64
x86
xworm
Yara
zpaq
Filter
Clear
SHA256
Author
Difficulty
Tags
Goal
Solutions
Likes
Comments
Created
478d992c999a0e93ada1c9aa10644e3abdc207d407492c5bc2710986de4d42be
struppigel
easy
msoffice
openxml
forensics
olelink
Where does this office document get the next stage and how? When was the document created?
—
1
0
25 Apr 2026