Yaqoob, a security analyst, was hired to perform malware analysis on a compromised machine. As part of the analysis, Yaqoob used a sophisticated tool to analyze all MS Office documents and review all the components that are suspected to be malicious. Identify the tool used by Yaqoob in the above scenario.