Alex, a cybersecurity analyst in a tech firm, has intercepted a suspicious Word document that was sent to the company ' s CEO via email. Upon preliminary inspection, the document seems benign, but considering the firm ' s recent threats of cyberattacks, Alex decides to investigate further. He needs a tool that can help perform static analysis on the document to determine if there ' s any hidden malware. From the following options, which tool would be most effective for Alex ' s needs?
Submit