LastVisitedPidlMRU

Overview

Evidence: LastVisitedPidlMRU Description: Enumerate LastVisitedPidlMRU Category: System Platform: windows Short Name: lstvstpidmru Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

LastVisitedPidlMRU tracks which folder a user last visited when using a file open/save dialog for each application. This registry artifact creates an association between executables and the folders users accessed while using those applications.

This can reveal which folders users accessed with specific programs, including applications that may have been deleted or are suspicious.

Data Collected

This collector gathers structured data about lastvisitedpidlmru.

LastVisitedPidlMRU Data

Field
Description
Example

KeyPath

Registry key path

Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU

LastWriteTime

Registry key last write time

2023-10-15T14:30:00

Value

MRU value name

0

Username

User account name

user

Path

Folder path accessed

C:\Users\user\Documents\Confidential

MRUPosition

Position in MRU list

0

RegPath

Path to registry hive

Registry/ntuser.dat

Collection Method

This collector:

  • Collects user registry hives (ntuser.dat)

  • Searches for: Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU

  • Parses MRUListEx binary data

  • Decodes shell item list data using libfwsi

  • Extracts folder paths and application associations

  • Orders by MRU position

Forensic Value

LastVisitedPidlMRU reveals application-specific folder access and can connect executables to data locations. Investigators use this data to identify which folders were accessed by specific programs, detect malware accessing sensitive directories, track file dialog operations, correlate applications with data access, prove application interaction with specific folders, and identify suspicious application-folder associations.

Last updated

Was this helpful?