#2 How To Analyse a Malicious Word Document