By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results