My PP grew to 8,212,334 inches 20,530,835 centimeters thank you for making my PP grow longer yay!
penis
miracle mineral solution bleach sulfuric acid trifluoromethanesulfonic acid
SHA256:965e7bbdf3e6a1171a50fcc4f0e5a9ac45b42cb*******488ab82b07bb4e8bf9
Exiftool File Metadata
CreatorTool: Softplicity
FileType: PDF
FileTypeExtension: pdf
Format: application/pdf
Linearized: No
MIMEType: application/pdf
ModifyDate: 2018:07:08 22:28:35+02:00
PDFVersion: 1.5
PageCount: 5
PageLayout: SinglePage
PageMode: UseNone
Phishing Website Contacted from The PDF File Linked with JillyJuice
Http: //Hunter () serv-botsalw () ru/
ESET -> Phishing
*checks-user-input
*detect-debug-environment
*direct-cpu-clock-access
*long-sleeps
*pdf runtime-modules
Processes Injected:
(2504) C: Program Files (x86)AdobeReader 9.0ReaderAcroRd32. Exe
Commonly Abused Properties:
*Contains 5 page(s).
*Contains 81 object start declaration(s) and 81 object end declaration(s).
*Contains 9 stream object start declaration(s) and 9 stream object end declaration(s).
*This PDF document has a cross reference table (xref).
*Has a pointer to the cross reference table (startxref).
*Has a trailer dictionary containing entries allowing the cross reference table, and thus the file objects, to be read.
WHOIS Records:
Creation Date: 2017-12-28T20:58:46Z
DNSSEC: unsigned
Domain Name: JILLYJUICE.COM
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NS14.WIXDNS.NET | NS15.WIXDNS.NET
Registrar: Network Solutions, LLC
Registrar Abuse Contact Email: *******@web.com
Registrar Abuse Contact Phone: *******680
Registrar IANA ID: 2
Registrar URL: http://networksolutions.com
Registrar WHOIS Server: whois.networksolutions.com
Registry Domain ID: *******180_DOMAIN_COM-VRSN
Registry Expiry Date: 2023-12-28T20:58:46Z
Updated Date: 2019-06-05T03:05:59Z
*Process Injection
ID: T1055
Sub-techniques: T1055. 001, T1055. 002, T1055. 003, T1055. 004, T1055. 005, T1055. 008, T1055. 009, T1055. 011, T1055. 012, T1055. 013, T1055. 014
Tactics: Defense Evasion, Privilege Escalation
Platforms: Linux, Windows, macOS
Data Sources: API monitoring, DLL monitoring, File monitoring, Named Pipes, Process monitoring
Defense Bypassed: Anti-virus, Application control
CAPEC ID: CAPEC-640
Contributors: Anastasios Pingios; Christiaan Beek,@ChristiaanBeek; Ryan Becwar
Version: 1.1
Created: 31 May 2017
Last Modified: 20 June 2020
The material facts are presented below to prove a case as to the activities of Jillian Mai-Thai Epperly. These activities as reflected below demonstrate that Jillian Mai-Thai Epperly has wittingly and on her own volition confederated with other perpetrators known and unknown in public eye to commit computer crimes and health fraud to unsuspecting marks in the domestic sector of the global world. Jillian has a campaign of monetization as to her activities related to the advertising of "Jilly Juice". Jilly Juice is in the midst of sodium poisoning. Deaths to both humans and animals have been noted. Jillian wittingly cherry-picked material as to the tangible results of what "Jilly Juice" actually does to the human body when consumed. Jillian failed to put warning labels to avoid issues of product liability on her product advertised as a "Remedy".
It is with this presentation before the public eye as a utility for the knowledge pool that Jillian be put on blast for profiting off of human suffering wittingly inflicted as the result of malpractice, health fraud, quackery, and a criminal agenda for private financial advanatage. The smoking gun proof is in the results for this one.
Jillian is a scam artist and an adversary.
-------------------------------------------------------------------------------------------
Malicious Website Advertisement on JillyJuice
https://www.virustotal.com/gui/domain/free.dailyrecipeguide.com/relations
Cash App Archived URL for reasons of Documenting Private Financial Advantage linked with Jillians Illicit Activities:
https://www.virustotal.com/gui/url/a4f55ad1e7578c6442c184fee4b6b*******f21c192b040d2c4bb28ac68dba18d9/details
2019 Detected technologies:
*Wix (CMS)
*Website React (JavaScript Frameworks)
*Website Google AdSense (Advertising Networks)
2018 Detected technologies:
*WordPress (CMS)
*PHP (Programming Languages)
*Nginx (Web Servers)
*React (JavaScript Frameworks)
*Google AdSense (Advertising Networks)
*Google Analytics (Analytics)
*Twitter Emoji (Twemoji) (Miscellaneous)
*jQuery (JavaScript Libraries)
Scan History:
Https :// urlscan. Io/search/#page. Domain%3Awww.jillyjuice. Com
Detailed Technology Profile:
https://builtwith.com/detailed/jillyjuice.com
2018 DOM Tree:
https://urlscan.io/result/70b7d872-41b5-42ef-8566-4921b*******ba/dom/
2019 DOM Tree:
https://urlscan.io/result/1e*******-7bf4-4d4c-a3e4-c071c8dd2c9a/
404 URLs. Suspicious Indicators.
https://www.jillyjuice (dot) com/\ 404 No Content
https://www.jillyjuice (dot) com/z; a. Crossorigin= 404 No Content
https://www.jillyjuice (dot) com/[]; c[l]={onLoad: function(b){h. Push(b); g&&! X||e(h)}, forceLoad: function(){x=! 0; g&&setTimeout(function(){e(h)})}}; 404 No content
Jillian uses smoke and mirrors to convey a false front about "Jilly Juice". She is using false advertisements on her website that will infect your browser and computer system to cause damages and theft of confidential information. Clearly this is a trap she rigged up.
Proof of Concept [18-07-2019]
https://archive.is/zKf5D
Competitive Reverse Engineering Intel on Jillian's Malvertisements
https://www.virustotal.com/gui/file/f*******db443b7eb5895db65d168e6e7d7b1af92f4666ba8602d52e09a9a7631/detection
https://www.virustotal.com/gui/ip-address/35.244.218.203/relations
https://www.virustotal.com/gui/domain/infragistics.com/relations
https://www.virustotal.com/gui/domain/asp.net/relations
Jillian Mai-Thai Epperly uses her skills in psychological manipulation as a front to ply her vile trade. The manufacturer and distributor of a deadly health hazard known as "jilly juice" that proof positively confirms sodium poisoning. A shrewd sinister cold-blooded operator who's false advertisement claims prey on unsuspecting easy-marks that don't know their nutritional facts about the sodium content contained within a gallon of "Jilly Juice". This operation of hers alone accounts for a significant portion of pseudo-science.
Two Patterns of Racketeering Activity:
Computer Crimes
Health Fraud
Pattern 1: Computer Crimes
------------------------------------
Malvertising [7/16/2019]
https://archive.is/cRsji
Quttera Result Files Analysis
https://archive.is/3ocNL
Virustotal Reverse Engineering Competitive Intelligence
https://www.virustotal.com/gui/url/77b690afe99a61accafb8d249bf3ed52fbbc9fe7bc8f*******e*******e8dcdb8c/detection
IP Address Relations
https://www.virustotal.com/gui/ip-address/198.57.219.8/relations
Threat MD5 Analysis
https://ybin.me/p/fcd6708f5bf87cd1#5Wy6knEH8rd5OffdYGeT/3+aSVajEX0by36pvT3wgDE=
------------------------------------
Pattern 2: Health Fraud
Proof of Concept -> BBB Scam Tracker
BBB Scam Tracker Report Incidents from 2018
Date Scam Type Postal Code Dollars Lost Details
Mar 27,2018 Healthcare/Medicaid/Medicare ******* $30.00 View
Mar 24,2018 Healthcare/Medicaid/Medicare V2R 5S5 $150.00 View
Mar 07,2018 Healthcare/Medicaid/Medicare ******* $0.00 View
Feb 03,2018 Healthcare/Medicaid/Medicare ******* $230.00 View
Jan 29,2018 Healthcare/Medicaid/Medicare ******* $0.00 View
Computer Fraud and Abuse Act
18 U.S. Code §1030. Fraud and related activity in connection with computers
18 U.S. C. § 1030(a)(5): Damaging a protected computer (including viruses, worms)
[2019-07-12]
Be advised that Jillian Mai-Thai Epperly is hosting a downloadable trojan browser hijacker on her Jillyjuice website named "DailyRecipeGuide". She is hosting different "Advertisements" to lure website visitors in for reasons of social engineering. She requires you to give consent in order to execute the file. Don't. The file was tested. It isn't safe to execute and isn't safe to visit that website. She has it rigged up with potential "Malvertising". The trojan executable is a browser hijacker that allows her to spy in on your browsing activities. She will be attempting to track your every move if you download and excute that file.
Sandbox Proof of Concept on 7-12-2019:
https://archive.is/X9XGa
https://archive.fo/Xyvxs
https://archive.fo/1qqvS
https://archive.fo/eY1ET
Tencent HABO Intel
Https :// vtbehaviour. Commondatastorage. Googleapis. Com/f21b2144f*******d7e1f78a3b*******f147cc9fa*******a*******695d1416_Tencent%20HABO. Html? GoogleAccessId=*******@developer. Gserviceaccount. Com&Expires=*******763&Signature=HmIRIkzioYk7EGSmFkCjZ9uwc3f9WnkSiKUHf%2BsDcLN77oUjlTiRvIx%2Bf89FcpPXilxDOTqiOhYO%0AqMcH90AAGtcyEc4a73Fm0jsCIH29fAs0OLkUMCIItB5nXmBGeKKyFukTqHCRNqxw922jtHSHJX7N%0AzxKiGx8DCTGEVI4dzQ0%3D&response-content-type=text%2Fhtml;
Virustotal Reverse Engineering Intel
https://www.virustotal.com/gui/file/f21b2144f*******d7e1f78a3b*******f147cc9fa*******a*******695d1416/detection
Mindspark Domain Information
https://www.virustotal.com/gui/domain/www.mindspark.com/relations
Racketeer Influenced and Corrupt Organization. Malpractice. Nostrum. Sodium Poisoning. Health Hazard. Quackery. Health Fraud. Snake-oil. Pseudo-science. Money Laundering. False advertising. Sucker List. Confidence Trick. Astroturfers and Shills that defend this fraudulent non-existent solution to real health issues.
Dangerous quack that is peddling a "Protocol" containing the following ingredients: 1 tbs salt + 2 cups cabbage + 2 cups water fermented for 3 days. 1 Teaspoon of Sodium = 2,325 mg or 96% of your daily value requirement. 1 Tablespoon of Sodium = 6976 mg or 290% of your daily value requirement.
BBB has received multiple scamtracker reports from consumers that Jillian Burke-Epperly is marketing Jilly Juice on the website jillyjuice.com as an anti inflammatory diet. The reports to BBB indicate severe side effects which required hospitalization and/or death from extreme dehydration and salt poisoning. The website states Jilly Juice will reverse all health conditions A-Z including: autism, cancer, HIV, downs syndrome and homosexuality. The "juice" is made up of fermented cabbage and salt and claims to detoxify the body. Members are required to pay $30 per year for a subscription to the website and additional fees up to $75 for for private consultations.
The BBB advises consumers to consult a physician before beginning any plan to treat medical conditions.
Youtube Page:
https://www.youtube.com/user/maithimouse
https://archive.is/wxVTR
FACEBOOK:
https://archive.fo/https://www.facebook.com/JillianEpperly
https://www.facebook.com/JillianEpperly
This is a file compiled on Jillian Mai-Thi Epperly. Background Information is also inserted into this file.
Website Reviews:
https://www.trustpilot.com/review/jillyjuice.com
https://www.sitejabber.com/reviews/jillyjuice.com
Consumer Fraud Collection:
https://archive.li/https://www.facebook.com/exposingtheliescandidaweaponizedfungus
FACEBOOK:
https://archive.fo/https://www.facebook.com/JillianEpperly
WOT Score Card:
https://www.mywot.com/scorecard/jillyjuice.com
BBB Reviews:
https://www.bbb.org/us/oh/canton/profile/health-and-medical-products/jilly-juice-*******9019/customer-reviews
Whois Record for Jillyjuice[dot]com
https://whois.domaintools.com/jillyjuice.com
Virustotal Passive DNS Replication
https://www.virustotal.com/#/ip-address/162.144.36.65
HEUR: Trojan. PDF. Agent. Gen/Malware. PDF/Gen(91%) (AI) Associated with the Domain Information Publicly Available. Provided by Kaspersky, Rising, and ZoneAlarm by Checkpoint.
https://www.virustotal.com/#/file/965e7bbdf3e6a1171a50fcc4f0e5a9ac45b42cb*******488ab82b07bb4e8bf9/detection
Here is a nutritional daily value requirement display of what is on the back of a food or beverage product for consumer awareness. Jillian does not even put nutritional fact labels on her products nor does she believe in consumer reviews and objections on the grounds that the benefits as she advertises can ever be proven.
https://www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/LabelingNutrition/ucm*******.htm
Change[dot]org petition
https://www.change.org/p/facebook-ban-jillian-mai-thi-from-facebook-and-all-other-social-media
Product of a Honeypot Token On Jillian's Website, Email and other things below. A Scam-Baiting/Social Engineering method was used in order to extract the entire layout of where her server is and the IP's in which Email is sent. This reverse engineering analysis also shows that Jillian deceptively tampers with EXIF Metadataa to give a false impression to her viewers about her photos that she takes of herself. She used Adobe Photoshop to cloak adverse health effects on her own body from her lethal health hazard.
--------------------------------------
Received: from server.jillyjuice.com (server.jillyjuice.com [162. 144. 36. 65])
By node6 (Haraka/2. 8. 16) with ESMTP id *******CCF-E87B-4B53-85B4-3F6180D659BC. 1
Envelope-from <*******@server.jillyjuice.com>;
Tue, 7th Apr 2018 15:10:34 -0900
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
D=jillyjuice.com; s=default; h=Content-Type: MIME-Version: Message-ID: From: Date: Subject: To: Sender: Reply-To: Cc: Content-Transfer-Encoding: Content-ID:
Content-Description: Resent-Date: Resent-From: Resent-Sender: Resent-To: Resent-Cc: Resent-Message-ID: In-Reply-To: References: List-Id: List-Help: List-Unsubscribe:
List-Subscribe: List-Post: List-Owner: List-Archive;
Bh=697w/BkQw+V/7dBrMBg354Onr0pXoGZ0fmyZm/7g0Wg=; b=DbtlbzwGlVStPCmLPTz4tvThC2
HdnpfK8s/M7xbE0SmsgFKhgFQREAZtK3ETEVIfAgsl7Kpc7YJvY04+1DXVsmiTv6u/cq88DjLGndc
K1esD8gJXUceGjgcePDnwkpl1uFQdNWDvB124Kez8GnbUQHc7aPf4+5/siN8ouvFhtiaB90NhpTUb
UKoN5Ng2nG6mF4MpGUHk0l5RGfHMbcl5RPSwiyHd1OwC3qIvYvNIAYriPWjASfXGYXRyOcaDriMsC
AOpdrj3GCtBdCpky66LBVjryW4PgeW0zZG97qnAaQBvBSO+wlaElsvmg7lQ6AiC0QVuQ9lIIielVl
KA//o2Mg==;
Received: from jillyjuice by server.jillyjuice.com with local (Exim 4.91)
(envelope-from <*******@server.jillyjuice.com>)
Id 7kD9Rs-*******fg-2W
For *******@direct-mail.info; Tue, 22 Feb 2018 04:35:51 -0600
To: *******@direct-mail.info
Subject: Thank you for registering for Jilly Juice LLC
X-PHP-Script: www.jillyjuice.com/index.php for 162. 144. 36. 65,167.114.101.64
X-PHP-Originating-Script: 500: class-phpmailer. Php
Date: Tue, 22 Apr 2018 12:17:45 +*******
From: WordPress <*******@jillyjuice.com>
Message-ID: <*******@www.jillyjuice.com>
X-Mailer: PHPMailer 5. 2. 22 (https://github.com/PHPMailer/PHPMailer)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-AntiAbuse: Primary Hostname - server.jillyjuice.com
X-AntiAbuse: Originator/Caller UID/GID - [500 500] / [47 12]
X-AntiAbuse: Sender Address Domain - server.jillyjuice.com
X-Get-Message-Sender-Via: server.jillyjuice.com: authenticated_id: jillyjui/from_h
X-Authenticated-Sender: server.jillyjuice.com: *******@jillyjuice.com
X-Source: /opt/cpanel/ea-php70/root/usr/bin/php-cgi
X-Source-Args: /opt/cpanel/ea-php70/root/usr/bin/php-cgi /home/jillyjui/public_html/index. Php
X-Source-Dir: jillyjuice.com:/public_html
Output complete without errors.
IPTC
Coded Character Set = 27, 37, 71
Record Version = 0
Original Transmission Reference = uln6HNN0xcq_Qm6Wvs8Z
IPTC Core (Adobe XMP)
Expand All / Collapse All / Show/Hide XMP Source / Show/Hide XMP Legend
EXIF IFD0
Image Width {0x0100} = 720 pixels
Image Length {0x0101} = 720 pixels
Bits Per Sample {0x0102} = 8, 8, 8
Photometric Interpretation {0x0106} = RGB (2)
Picture Orientation {0x0112} = normal (1)
Samples Per Pixel {0x0115} = 3
X-Resolution {0x011A} = 72/1 ===> 72
Y-Resolution {0x011B} = 72/1 ===> 72
X/Y-Resolution Unit {0x0128} = inch (2)
Software / Firmware Version {0x0131} = Adobe Photoshop CC 2017 (Windows)
Last Modified Date/Time {0x0132} = 2018:05:21 12:45:05
EXIF Sub IFD
EXIF Version {0x9000} = 0221
Colour Space {0xA001} = sRGB (1)
Image Width {0xA002} = 455 pixels
Image Height {0xA003} = 455 pixels
EXIF IFD1
Compression {0x0103} = JPEG compression (6)
X-Resolution {0x011A} = 72/1 ===> 72
Y-Resolution {0x011B} = 72/1 ===> 72
X/Y-Resolution Unit {0x0128} = inch (2)
ImageWidth 720
ImageHeight 720
BitsPerSample 8, 8, 8
PhotometricInterpretation 2
Orientation 1
SamplesPerPixel 3
XResolution 72
YResolution 72
ResolutionUnit 2
Software Adobe Photoshop CC 2017 (Windows)
ModifyDate 2018:05:21 12:45:05
ColorSpace 1
ExifImageWidth 455
ExifImageHeight 455
HasThumbnail true
ThumbnailWidth 160
ThumbnailHeight 160
ThumbnailType image/jpeg
Quantization Tables
Standard JPEG Table Quality=82
Table 0 (8 bit)
6 4 4 5 4 4 6 5
5 5 6 6 6 7 9 14
9 9 8 8 9 18 13 13
10 14 21 18 22 22 21 18
20 20 23 26 33 28 23 24
31 25 20 20 29 39 29 31
34 35 37 37 37 22 28 41
44 40 36 43 33 36 37 36
Table 1 (8 bit)
6 6 6 9 8 9 17 9
9 17 36 24 20 24 36 36
36 36 36 36 36 36 36 36
36 36 36 36 36 36 36 36
36 36 36 36 36 36 36 36
36 36 36 36 36 36 36 36
36 36 36 36 36 36 36 36
36 36 36 36 36 36 36 36
Structure
SOI
APP0
APP1
APP2
APP13 (IPTC)
APP1
DQT
DQT
SOF0 (Baseline DCT)
DHT
DHT
DHT
DHT
SOS
EOI
String Extraction:
JFIF
Adobe Photoshop CC 2017 (Windows)
2018:05:21 12:45:05
0221
Adobe_CM
Adobe
B34r
7GWgw
DEU6te
Wew3
CYfD9
2prj
McGF
ICC_PROFILE
Lcms
MntrRGB XYZ
9acspAPPL
Desc
Wtpt
Bkpt
RTRC
Text
Curv
DPhotoshop 3.0
8BIM
Uln6HNN0xcq_Qm6Wvs8Z
http://ns.adobe.com/xap/1.0/? Xpacket begin="
" id="W5M0MpCehiHzreSzNTczkc9d"?>
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
5CFVcst
6Kpx
17qo
Y3Px
EJGuP
Mo0D
BuGg
NgUf
Tr41
CnVs
ULn8
IJBrFI
RJRp
4s2H
A6Y2
K1C/"W7f
0mK2
LQW2
Jp51
6Aoj
Mkdk
EXIF Tool Metadata:
File Name: jillianhead1cudrop-300x300. Jpg
File Size: 25 kB
File Permissions: rw-rw-rw-
File Type: JPEG
File Type Extension: jpg
MIME Type: image/jpeg
JFIF Version: 1.01
Exif Byte Order: Big-endian (Motorola, MM)
Photometric Interpretation: RGB
Orientation: Horizontal (normal)
Samples Per Pixel: 3
X Resolution: 72
Y Resolution: 72
Resolution Unit: inches
Software: Adobe Photoshop CC 2017 (Windows)
Modify Date: 2018:05:21 12:45:05
Exif Version: 0221
Color Space: sRGB
Exif Image Width: 455
Exif Image Height: 455
Compression: JPEG (old-style)
Thumbnail Offset: 416
Thumbnail Length: 5285
Profile CMM Type: lcms
Profile Version: 2. 1. 0
Profile Class: Display Device Profile
Color Space Data: RGB
Profile Connection Space: XYZ
Profile Date Time: 2012:01:25 03:41:57
Profile File Signature: acsp
Primary Platform: Apple Computer Inc.
CMM Flags: Not Embedded, Independent
Device Manufacturer:
Device Model:
Device Attributes: Reflective, Glossy, Positive, Color
Rendering Intent: Perceptual
Connection Space Illuminant: 0.9642 1 0.*******
Profile Creator: lcms
Profile ID: 0
Profile Description: c2
Profile Copyright: FB
Media White Point: 0.9642 1 0.*******
Media Black Point: 0.******* 0.0125 0.*******
Red Matrix Column: 0.******* 0.******* 0.*******
Green Matrix Column: 0.******* 0.******* 0.*******
Blue Matrix Column: 0.******* 0.******* 0.7141
Red Tone Reproduction Curve: (Binary data 64 bytes, use -b option to extract)
Green Tone Reproduction Curve: (Binary data 64 bytes, use -b option to extract)
Blue Tone Reproduction Curve: (Binary data 64 bytes, use -b option to extract)
Current IPTC Digest: d95b0edccc80f379b*******d7a4e1868
Coded Character Set: UTF8
Application Record Version: 0
Original Transmission Reference: uln6HNN0xcq_Qm6Wvs8Z
XMP Toolkit: Adobe XMP Core 5.6-c138 79.*******, 2016/09/14-01:09:01
Legacy IPTC Digest: D95B0EDCCC80F379B*******D7A4E1868
Transmission Reference: uln6HNN0xcq_Qm6Wvs8Z
Color Mode: RGB
ICC Profile Name: c2
Document ID: adobe: docid: photoshop: a24ec360-5d1e-11e8-8617-9b54fcc26d73
Instance ID: xmp. Iid: c6ce409e-0cb5-d640-ab13-*******a3ee49f
Original Document ID: EBF9B2F*******DAA9D7D05E246D617FE6
Format: image/jpeg
Create Date: 2018:05:21 12:15:23-05:00
Metadata Date: 2018:05:21 12:45:05-05:00
Creator Tool: Adobe Photoshop CC 2017 (Windows)
Document Ancestors: adobe: docid: photoshop: e3c0e814-5d1a-11e8-8617-9b54fcc26d73
History Action: saved, saved
History Instance ID: xmp. Iid: ae1aef6d-4af2-e64c-a7ac-520ccc2b016a, xmp. Iid: c6ce409e-0cb5-d640-ab13-*******a3ee49f
History When: 2018:05:21 12:18:02-05:00,2018:05:21 12:45:05-05:00
History Software Agent: Adobe Photoshop CC 2017 (Windows), Adobe Photoshop CC 2017 (Windows)
History Changed: /, /
Image Width: 300
Image Height: 300
Encoding Process: Baseline DCT, Huffman coding
Bits Per Sample: 8
Color Components: 3
Y Cb Cr Sub Sampling: YCbCr4:4: 4 (1 1)
Image Size: 300x300
Megapixels: 0.090
Thumbnail Image: (Binary data 5285 bytes, use -b option to extract)