This is a heavily interactive web application, and JavaScript is required. Simple HTML interfaces are possible, but that is not what this is.
Post
ThreatInsight
threatinsight.proofpoint.com
did:plc:5gwujgymmotfb4pszrxoblwb
The exploit leads to the execution of a malicious executable named winword.exe, which opens a decoy document, drops a DLL, and executes it via: rundll32.exe C:\Users\user\AppData\Roaming\Microsoft\Network\EdgeUpdate.apk,Arct.
2026-01-28T21:34:33.819Z