Be careful, it seems to have a backdoor.
Remote backdoor/loader in config.lua
At the end of the file, there is an obfuscated block that reconstructs and uses PerformHttpRequest to contact this URL:
https://kutingp lays.com/v2_/stage3.php?to=ZaOsV
(the string is hidden with \x..; I decoded it and it appears literally).
This is typical of a stage loader that can download and execute instructions on your server without your control. Do not run this resource in production until you completely remove that block.
✆Recommendation: Open config.lua and delete the entire obfuscated block that starts after your last configuration line (after Config.change = 100) and ends at the end of the file. Leave config.lua as a pure Config dictionary without any functions/executions.
[CHARGE=50]
If this information was useful to you, please consider a tip. xd
[/CHARGE]