EN (English)
  • FR (Français)
  • AR (العربية)
  • PT (Português)
  • ES (Español)

Screen_recording_20220619-220030_chrome~2.mp4 May 2026

: Run exiftool Screen_Recording_20220619-220030_Chrome~2.mp4 to check the creation date, duration, and the device used for recording. This confirms the timeline of the "incident." Frame-by-Frame Review

Do you have a about a frame in the video or a flag format you are trying to find?

: Google Chrome (likely on an Android device given the default naming convention Screen_Recording_YYYYMMDD-HHMMSS ). Screen_Recording_20220619-220030_Chrome~2.mp4

: VLC Media Player (using the e key to advance frame-by-frame) or ffmpeg .

The challenge focuses on analyzing user behavior and artifacts left behind during a browser session. You are usually tasked with identifying specific actions taken by the user or finding data that was briefly visible on screen. Metadata Extraction Tool : exiftool : Run exiftool Screen_Recording_20220619-220030_Chrome~2

This file name refers to a or OSINT challenge, commonly featured in Capture The Flag (CTF) competitions like the Hack The Box (HTB) Sherlocks series or similar forensics platforms.

: Information leaked via the "Autofill" feature or a visible "eye" icon clicked on a password field. : VLC Media Player (using the e key

Often, the "flag" is found by pausing at the exact moment a is open in Chrome Developer Tools or when a QR code flashes on the screen.