The exploit for a new zero-day vulnerability in Windows is executed by deleting files, drag-and-dropping them, or right ...