-> THIS <- backdoor is INVISIBLE. Heres what WE know... '

yes the require is at the end of the QSiginal variable

I can see it downloading asset id: 18511181373, just trying to figure out where it gets the number from since it must be part the QSignal function.


this image here shows some numbers, as much as they seem insignificant, they hold values

this image here shows how they use the marketplace service to get the info of that product.

**the bottom image is the ‘Return()’ function

1 Like

the QSiginal is called later and it even looks weird i think he called it in a hidden way like alot of variables for it so it becomes hard to find it

yes, most of the script is a whole load of yap


for example this looks confusing and to any programmer this barely makes sense

and simply what the Bl#xFr#uit module does it have a script parented to a module and the whole script is commented and in the module script it checks when a player join and then it takes the script.info and parents it to the SSS its very long script that it lags my script editor

The reason the backdoor sucks is because most scripters know its a backdoor due to the code being mostly useless

this is the module it has a script child of it but i canot send it or i will get moderated again

local module = {}

local Players = game:GetService("Players")
local Logs = script.Info


Players.PlayerAdded:Connect(function(Plr)
	Logs.Parent = game.ServerScriptService
			
	end)

return module

What do you mean it got moderated? Like devforums automatixally moderated it?

no it got sent to a moderator to approve it and he disapproved it ig

i got to wait for a mod to approve it so it get sent but they disapproved it

yep exactly, the script makes no sense and all of that to ‘weld’ is literally useless… but to the OP

PLEASE check your scripts first before running code, or dont even allow scripts that is just a chair

Ah ok, code obfuscated the values. I was hoping it would be something easy like “here is the number”, :rofl:

I wanted to make sure it was in the script and not hacked in the model in some way.
Well for everyone’s reference, the Asset ID is 17854514798 that needs to be reported, then the reference Asset ID 18511181373, which should also be reported. I think enough of us should get the moderators attention, or at least the Ai moderator. :sweat_smile:

1 Like

by the way, you should all report this whole account, this account has assets filled with backdoors. all using pretty much the same method lol.

1 Like

the user that made that module has 3 modules like Bl#xFr#uit/Bro#kHav#en/and smt else you should report those 3 modules and the account

i just managed to deobfuscate the welding code, wow its not hidden well LOL. but yeah good job finding the user. if u want the userid of the person whos doing this, its
6131058109 THIS IS THE USERID OF THE PERSON OWNING THESE MODULES

although i do guarantee this is not their main account, probably a hacked account

2 Likes

Start with https://www.roblox.com/abusereport/ and then just keep changing the asset ID for every report so you don’t have to go hunt all these numbers down. What we have so far:
Couch Model (with exploit code): 17854514798
Hidden Download AssetID (what the exploit code downloads): 18511181373

Finally, the username connected to it: @Harleymartinabum [Player ID: 7065602262]

The userID of the model owner, xavier has already posted earlier. :+1:

1 Like

If you want the method of how to find the backdoor, message me on discord @prodbyxvr

I got a different id from the UDim2 values, which was a game id, 4839027554 which is likely to be connected to this, the game was created 4 years ago and updated a week ago. I’m not 100% sure, I’m probably wrong, lol.

we already found the original backdoor scripts and user who created them. thank you though, i will see if this game is relevant

1 Like

I snooped the network to find the ID being transmitted, yeah I’m old. :rofl:

1 Like