Functionality in ScreenSharing

LastActivityView serves as an excellent first-look tool during screenshares to quickly get a chronological overview of recent user actions:

  • Detecting File Execution: Shows recently run executables based on Prefetch data and potentially UserAssist or other registry traces.

  • Identifying Opened/Saved Files: Particularly useful for spotting recently accessed documents, images, archives, or potential cheat configuration files (.cfg, .ini, .json) based on the Open/Save MRU registry data it parses.

  • Tracking DLL Usage/Interaction: Can be effective at highlighting interactions with .dll files, especially those loaded via standard mechanisms or those that might have spoofed extensions (e.g., a cheat .dll renamed to look like a .cfg or .dat file). Often, the act of an injector selecting a DLL via an "Open File" dialog, or a program loading a configuration file, will register in the OpenSavePidlMRU keys, which LastActivityView surfaces.

  • Timeline Correlation: By presenting data from multiple sources sorted by time, it aids in establishing basic timelines and correlating different actions (e.g., downloading an archive, then an executable running from a temporary extraction folder shortly after).

Last updated