Identify the exploited vulnerability and its attack vector.

Identify the exploited vulnerability and its attack vector.
Analyze the vulnerability to determine 2 risks of this malware.
Outline step-by-step instructions on how to resolve the malware attack.