defenseguruLetsDefend: Malicious Document File Analysis 2In this part we are going to analyze the following document that contains malicious malware2d ago2d ago