0x00000000. Default value used when no other flag is explicitly set.
0x00000001. The Shell link was saved with an ID list.
0x00000002. The Shell link was saved with link information to enable distributed tracking. This information is used by .lnk files to locate the target if the targets's path has changed. It includes information such as volume label and serial number, although the specific stored information can change from release to release.
0x00000004. The link has a name.
0x00000008. The link has a relative path.
0x00000010. The link has a working directory.
0x00000020. The link has arguments.
0x00000040. The link has an icon location.
0x00000080. Stored strings are Unicode.
0x00000100. Prevents the storage of link tracking information. If this flag is set, it is less likely, though not impossible, that a target can be found by the link if that target is moved.
0x00000200. The link contains expandable environment strings such as %windir%.
0x00000400. Causes a 16-bit target application to run in a separate Virtual DOS Machine (VDM)/Windows on Windows (WOW).
0x00000800. Not supported. Note that as of Windows Vista, this value is no longer defined.
0x00001000. The link is a special Windows Installer link.
0x00002000. Causes the target application to run as a different user.
0x00004000. The icon path in the link contains an expandable environment string such as such as %windir%.
0x00008000. Prevents the use of ID list alias mapping when parsing the ID list from the path.
0x00010000. Forces the use of the UNC name (a full network resource name), rather than the local name.
0x00020000. Causes the target of this link to launch with a shim layer active. A shim is an intermediate DLL that facilitates compatibility between otherwise incompatible software services. Shims are typically used to provide version compatibility.
0x00040000. Introduced in Windows Vista. Disable object ID distributed tracking information.
0x00080000. Introduced in Windows Vista. Enable the caching of target metadata into the link file.
0x00100000. Introduced in Windows 7. Disable shell link tracking.
0x00200000. Introduced in Windows Vista. Disable known folder tracking information.
0x00400000. Introduced in Windows 7. Disable known folder alias mapping when loading the IDList during deserialization.
0x00800000. Introduced in Windows 7. Allow link to point to another shell link as long as this does not create cycles.
0x01000000. Introduced in Windows 7. Remove alias when saving the IDList.
0x02000000. Introduced in Windows 7. Recalculate the IDList from the path with the environmental variables at load time, rather than persisting the IDList.
0x04000000. Introduced in Windows 7. If the target is a UNC location on a local machine, keep the local IDList target in addition to the remote target.
0x08000000. Introduced in Windows 8. Persist the target IDlist in its volume-ID-relative form to avoid a dependency on drive letters.
Windows XP, Windows 2000 Professional, Windows 7 [desktop apps only] Windows Server 2008 R2 [desktop apps only]
shlobj_core.h (include Shlobj.h)
The feedback system for this content will be changing soon. Old comments will not be carried over. If content within a comment thread is important to you, please save a copy. For more information on the upcoming change, we invite you to read our blog post.