Search History in File explorer
1. Introduction
WordWheelQuery is a Windows artifact that stores the user’s search history inside File Explorer.
It allows the examiner to identify:
Search terms typed by the user
Quantity and frequency of searches
Indicators of user intent (e.g., “password”, “secret”, “.zip”, “.pdf”)
Recent activity on the system
Possible attempts to locate sensitive or deleted files
Storage location:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQueryEach entry is indexed numerically:
0, 1, 2, 3...And contains the corresponding search term.
2. Tools
Registry Explorer (Eric Zimmerman)
Search History in File Explorer: WordWheelQuery key and search keywords
Allows you to open NTUSER.DAT and navigate to the WordWheelQuery key.
It displays:
Numbered list of search terms
Chronological order (MRU)
Associated timestamps (when available)
Decoded and well-organized data
3. Practical Example: Analyzing WordWheelQuery
Obtain the NTUSER.DAT hive
Method 1: Using Registry Explorer
Open Registry Explorer
Go to File → Load Hive → select NTUSER.DAT
Navigate to:
You may see something like:
Practical Interpretation:
Entry 0 is the most recent search term.
Searches such as
*.zipmay indicate interest in compressed files.Terms like "password", "secret", "key" usually indicate intentional searching.
Sensitive search terms help identify user behavior before an incident.
Method 2: Using RegRipper
Command:
Typical output:
Interpretation:
Displays search terms clearly
Shows precise execution order
Excellent for including directly in a forensic report
Last updated