Registry Explorer
Developed by Eric Zimmerman, this GUI tool is essential for navigating exported registry hives. It includes built-in “Bookmarks” that automatically locate, parse, and chronologically sort all common MRU keys.
The philosophy behind MRU lists is simple: operating systems must remember past user actions to predict and facilitate future ones. Whenever a user performs a specific action—such as opening a file, typing a command, or mapping a network drive—Windows records this interaction within a dedicated registry key.
These keys often function like a stack or a linked list (typically managed by a value named MRUList or MRUListEx), where the most recent action is pushed to the top.
The vast majority of critical MRU keys are stored in the user-specific registry hive.
NTUSER.DAT (User Profile)Analysts prioritize four specific MRU keys during an investigation, as they reveal direct attacker interaction with the graphical interface or file system.
Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRUWin + R). Threat actors utilizing Living Off The Land (LOLBAS) techniques frequently use the Run dialog to spawn cmd.exe, powershell.exe, or regedit.exe. Finding an encoded PowerShell command or a reverse shell payload in this key is definitive proof of intentional, interactive execution.Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU.doc, .pdf, .zip), this key logs files that were opened or saved using the standard Windows common dialog boxes. It is crucial for proving data staging, the opening of malicious attachments, or the saving of exfiltrated data archives.Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsOpenSaveMRU, this key tracks recently accessed files and folders, populating the “Recent Documents” menu. It provides a macro-level view of the user’s data manipulation timeline.Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths\\SRV-FINANCE\C$ to access an administrative share during lateral movement reconnaissance, the string will be immortalized here.MRU lists are rarely analyzed in isolation. They serve as the focal point for proving human intent before pivoting to systemic execution artifacts.
RunMRU proves a human (or an interactive remote desktop session) consciously typed and executed a string.MRUListEx values. Furthermore, the Last Write Time of the parent registry key indicates the exact moment the most recent action occurred, establishing a precise “Time of Activity.”RunMRU, pivot to Prefetch (.pf) Files andEvent ID 4688 at that exact timestamp to determine if the command successfully spawned child processes.OpenSaveMRU, search for corresponding LNK Files or Jumplists to extract further metadata (such as the volume serial number or MAC address of the source drive).TypedPaths with Shellbags to map out the attacker’s complete directory browsing history.Analyzing raw registry hives manually is prone to misinterpreting the binary MRUListEx ordering structures. DFIR teams rely on automated parsing utilities.
Registry Explorer
Developed by Eric Zimmerman, this GUI tool is essential for navigating exported registry hives. It includes built-in “Bookmarks” that automatically locate, parse, and chronologically sort all common MRU keys.
RegRipper
The industry-standard command-line tool. Utilizing specific plugins (such as runmru, opensavemru, and recentdocs), analysts can extract MRU data rapidly during mass triage operations.