Skip to content

RunMRU

Evidence: RunMRU
Description: Enumerate RunMRU
Category: System
Platform: windows
Short Name: runmru
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

The Windows Run dialog (launched with Win+R) maintains a history of commands that users have typed and executed. This MRU (Most Recently Used) list is stored in the registry and preserves evidence of command execution, file paths, and applications launched.

Run dialog history can reveal sophisticated user knowledge, administrative commands, malware execution, and lateral movement activities.

This collector gathers structured data about runmru.

FieldDescriptionExample
KeyPathRegistry key pathSoftware\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
LastWriteTimeRegistry key last write time2023-10-15T14:30:00
ValueMRU value namea
UsernameUser account nameuser
FileNameCommand or path enteredcmd.exe /c powershell.exe -enc …
MRUPositionPosition in MRU list0
RegPathPath to registry hiveRegistry/ntuser.dat

This collector:

  • Collects user registry hives (ntuser.dat)
  • Searches for: Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
  • Parses MRUList string to determine access order
  • Extracts command strings from registry values
  • Orders by MRU position (most recent first)

Run dialog history reveals commands users have executed and can indicate administrative activity or malicious behavior. Investigators use this data to identify PowerShell or cmd.exe execution, detect lateral movement commands, track administrative tool usage, identify malware execution, prove user knowledge of specific commands, detect privilege escalation attempts, and correlate with process execution evidence.