Complete the following in your playbook:
Provide details of the malware.
Identify the exploited vulnerability and its attack vector.
Analyze the vulnerability to determine 2 risks of this malware.
Outline step-by-step instructions on how to resolve the malware attack.