Windows Registry Artifacts: Insights into User Activity
- Mar 31, 2024
- 2 min read
Updated: Feb 25
Updated in 24 Feb, 2025
------------------------------------------------------------------------------------------------------
1. Search History:
The "WordWheelQuery" registry key is a valuable artifact found in the Windows registry of Windows 7 to Windows 10 systems. It stores information about keywords searched for from the START menu bar, providing insights into user search behavior and interests.
NTUSER.DAT Hive.
NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Explorer\WorkWheelQuery
------------------------------------------------------------------------------------------------------
2. Typed Path:
This key will show when you have manually typed a path into the Start menu or into the Explorer bar. This key would be useful in a situation where you are trying to show that the user had specific knowledge of a location.
NTUSER.DAT hive.
NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Explorer\TypedPaths
------------------------------------------------------------------------------------------------------
3. Recent Docs:
To understand this artifact in-depth check out the below article:
RecentDocs: Uncovering User Activity Through Recently Opened Files
------------------------------------------------------------------------------------------------------
4. Microsoft Office Recent Docs:
To understand this artifact in-depth check out the below article:
Tracking Recently Opened Files in Microsoft Office: A Forensic Guide:
------------------------------------------------------------------------------------------------------
5. Last Visited MRU/ Open Save MRU
When you "save or open a file,"
Have you ever noticed that it might remember the location you previously saved or opened a file?
Have you noticed that when you save or open a file, there is a drop-down dialog box that remembers your previous save or open locations or files that have been opened?
(i) Open Save MRU
It acts as a repository for a history of files accessed or saved by users, offering a panoramic view of their digital footprint.
NTUSER.Dat Hive:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\
Through CMD:
reg query HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\
(ii) Last Visited MRU
The Last Visited MRU (Most Recently Used) artifact tracks the specific executable files used by an application to open files documented in the OpenSaveMRU key. Additionally, each value within this artifact also records the directory location for the last file accessed by that application.
NTUSER.Dat Hive:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\
Through CMD:
reg query
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
Last Visited Pid MRU :- Track application executable used to open files in Open save MRU and the last file path used (Program execution)
Open save pid MRU”- Values under this show items input in open save dialog without an extension (File knowledge)
* :-(track the most recent files of any extension input in open save dialog).
------------------------------------------------------------------------------------------------------
6. Last Commands executed:
NTUSER.DAT Hive:
NTUSER.DAT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
Command:
reg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU

-------------------------------------------------------------------------------------------------------
7. Trusted Office Documents
To understand this artifact in-depth check out the below article:
Tracking Trusted Office Documents: A Key to Investigating Macro-Based Malware
------------------------------------------------------------------------------------------------------
8. Installed Applications
To understand this artifact in-depth check out the below article:
Windows Registry: A Forensic Goldmine for Installed Applications
-----------------------------------------------Dean--------------------------------------------------------
To Learn In deep check out below blog
Comments