the primary exploit opens a command shell with a susceptible Windows procedure once the rigged JPEG file is opened using Home windows Explorer, which happens to be utilized to search file directories on Windows https://bookmarks-hit.com/story18072482/exe-to-jpg-for-dummies