Skip to content

LastVisitedPidlMRU

Evidence: LastVisitedPidlMRU
Description: Enumerate LastVisitedPidlMRU
Category: System
Platform: windows
Short Name: lstvstpidmru
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

LastVisitedPidlMRU tracks which folder a user last visited when using a file open/save dialog for each application. This registry artifact creates an association between executables and the folders users accessed while using those applications.

This can reveal which folders users accessed with specific programs, including applications that may have been deleted or are suspicious.

This collector gathers structured data about lastvisitedpidlmru.

FieldDescriptionExample
KeyPathRegistry key pathSoftware\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
LastWriteTimeRegistry key last write time2023-10-15T14:30:00
ValueMRU value name0
UsernameUser account nameuser
PathFolder path accessedC:\Users\user\Documents\Confidential
MRUPositionPosition in MRU list0
RegPathPath to registry hiveRegistry/ntuser.dat

This collector:

  • Collects user registry hives (ntuser.dat)
  • Searches for: Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
  • Parses MRUListEx binary data
  • Decodes shell item list data using libfwsi
  • Extracts folder paths and application associations
  • Orders by MRU position

LastVisitedPidlMRU reveals application-specific folder access and can connect executables to data locations. Investigators use this data to identify which folders were accessed by specific programs, detect malware accessing sensitive directories, track file dialog operations, correlate applications with data access, prove application interaction with specific folders, and identify suspicious application-folder associations.