How can I see the malicious aspects of a file I've tested?

Each object in the file can be selected so that the analyst can examine the JSON or content. In this example, an analyst has selected the last node in the line of malicious nodes to see the buffer overflow condition for the Equation Editor Vulnerability (CVE-2017-11882) is present.