I am working with some extremely complicated JavaScript. It is around 70,000 lines long and sections of the code look like this
U2xx.l11="0x78920d50";m2xx.r9G="11";b2xx.v3y="0x744ebc37";P2xx.K5h="0x4949db92";k4vv.k7Q=1099;k4vv.j6Q=255;C2xx.m6V=7035;f2xx.S7U="0x88f07878";v2xx.U0z="10991";h2xx.c0b="2665";U2xx.T11="0xd52da96f";I2xx.O2z="10410";v2xx.H2k="450";B2xx.L7n=0x88;E2xx.X4y="0xe8";j2xx.f4h="0xd36ebdd3";M2xx.o21="0x30fa5520";Z2xx.T4b="6325";F2xx.s4G="9036";G2xx.L2r=0xf46e5918;b2xx.X3y="0xe11ce5ed";h2xx.y0b="8843";Q2xx.H3Z=5152;b2xx.V7y="0xe89c636e";S2xx.v3b="6598";n2xx.E5y="0x00000000";K2xx.x90="0x7f456253";E2xx.J8y="0x88";i2xx.C70="0x30f3dcb2";Z2xx.X1b="6970";G2xx.z2r=0x171d121b;k2xx.e35=0x9c;Y2xx.s80="0x9d342e53";i2xx.j70="0x937c69d0";S2xx.a5b="3997";s2xx.l0t="5261";h2xx.C0b="3278";l2xx.a40="0x0f9357e7";
I know the Javascript is used to generate cookies to authenticate post requests sent to a web server just I am struggling to figure out how with the extremely obfuscated variable names and values.
Are there any tools that will help me reverse the hex values and present variables in a nice way? I have tried several tools like jsbeautify, jsnice and also Malzilla but to no effect.
I have posted some more code below if this helps provide more context
function Z2xx(){}E2xx.T8y="0x5f";P2xx.o6h="0x05050f0a";l2xx.h00="0xc035a266";v2xx.e3z="4226";o2xx.f0y="0x3f";O2xx.D51="0x0d507892";G2xx.Q2r=0xa970b999;E2xx.J4y="0xbd";T2xx.K1U="0xa1dddd7c";E2xx.D8y="0x2a";I2xx.e5G="6255";u2xx.v8r=0x0b3698d4;s2xx.w6t="9585";h2xx.t0b="9168";v2xx.r1z="9246";j2xx.P1h="0xe138d9e1";f2xx.a9U="0x06040202";I2xx.X2z="1449";v2xx.r3z="1662";l2xx.s40="0xadf28bc7";k4vv.S6Q=128;U2xx.X81="0x06d46f04";j2xx.n0h=0x7b7b8df6;u2xx.N8r="0xefb04d43";h2xx.H9b="36";Q2xx.U8V=5772;K2xx.g60="0xa38fb562";C2xx.h9V=7415;f2xx.o7U="0x7ca1dddd";C2xx.E8W=9174;v2xx.g3z="53";g2xx.J2n="0xd7618c9a";C2xx.S6V=7024;m2xx.s9G="5463";b2xx.F20="0x080cb3de";m2xx.Y0G="7455";F2xx.O8G="1870";B2xx.W7n="54";u2xx.Z4r="0xe5d7fc4f";Z2xx.s1b="532";i2xx.d70="0x23312a3f";b2xx.g3y="0x4665517f";U2xx.c41="0x75074caf";i2xx.o70="0x4ec78749";E2xx.G8y="0x3d";Y2xx.H80="0x75a4f6eb";v2xx.e7z="7368";f2xx.E7U="0x23cbe8e8";E2xx.y4y="0x8a";S2xx.u3b="1645";Q2xx.R1Z=3295;Y2xx.A20="0x12814cf0";U2xx.C11="0x9448fa11";Z2xx.P1b="20";T2xx.A4U="0x4824246c";W2xx.c6k="10044";n2xx.B5y="0x0c0a67b1";M2xx.w21="0xe49cd8b4";g2xx.G31="0xd1c1d938";Q2xx.r4V=6151;E2xx.B4y="0x56";E2xx.R8y="0xde";F2xx.G2G="5630";i2xx.X50="0x3bc54466";W2xx.i85="7936";a2xx.X01="0xa3405fc2";B2xx.Q7n="6155";a2xx.h01="0x4dd68d76";S2xx.n5b="11018";i2xx.M50="0x919e1b9b";n2xx.A5y="0x3c22e043";c2xx.j3U="0xabe64dab";U2xx.t41="0xedfc68b6";j2xx.j0h="0x7d7d87fa";k2xx.c75="2369";b2xx.R7y="0xe6956e65";l2xx.G10="0xf582c3af";U2xx.b41="0x9b919e1b";n2xx.G9y="0x4e69e2a1";h2xx.N0b="9278";k4vv.L1Q=3;U2xx.O11="0xc3aff582";K2xx.v90="0xd323ab73";h2xx.J0b="10393";P2xx.M5h="0x24246c48";j2xx.Z0h="0x41c38241";k2xx.O35="0xfe";M2xx.F21="0x4165537e";Z2xx.e6W=10743;W2xx.x85="7666";G2xx.C8r="0x71dd27b9";U2xx.B11="0xd0937c69";k2xx.Y75="9992";v2xx.J9z="1023";o2xx.d4y="0x66";l2xx.B10="0xe42c3a9d";U2xx.c81="0x83ec390b";k2xx.J75="0x36";W2xx.Z4k="9780";k2xx.e75="0x02";Q2xx.C0V=6674;K2xx.z90=0x43cc8940;O2xx.B71="0x43cc8940";v2xx.Q6z="7064";o2xx.k6y="0x83";C2xx.N7V=8395;C2xx.B6V=7168;k4vv.w9Q=387;U2xx.r41=0x1ea9c814;j2xx.C4h="0x7395e673";n2xx.c9y="0x8acf1c2b";I2xx.G8z="7612";c2xx.b3U="0x3a2c1616";l2xx.L10="0x7bdb3bbb";F2xx.V8G="4369";v2xx.T4z="5120";k4vv.y2Z=2149;r2xx.p6U="0xf6a45252";I2xx.p2z="5850";F2xx.n8G="6383";O2xx.K71="0xbb7bdb3b";r2xx.b0U="0x5a2d2d77";h2xx.u9b="2176";m2xx.p6G="21";n2xx.f5y=0x1b9b919e;c2xx.M3U="0xf20dfff2";f2xx.o9U="0x2ac5efef";b2xx.U7y="0x87494ec7";l2xx.X40="0xbbee99dd";S2xx.g7b="2801";I2xx.x7G="10737";a2xx.i01=0xd647136d;r2xx.H0U="0x458fcaca";k2xx.h35="0x35";k4vv.I0Q=26;O2xx.Z71="0x99a970b9";o2xx.n1y="0x11";k2xx.H35="0xa4";r2xx.j6U="0x694e2727";Z2xx.a4b="389";l2xx.Z00="0x30c6a594";r2xx.v0U="0x65bfbfda";n2xx.q6y="0x8ec9c844";M2xx.D30="0xc43eb968";i2xx.h70="0xe3d077c1";g2xx.H2n="0x51336097";c2xx.Y2h="0x18283018";E2xx.a8y="0xcd";O2xx.B51="0xdb79c8ee";S2xx.X3b="9509";r2xx.q6U="0x97138484";Y2xx.b40="0x1e3daed5";n2xx.a5y="0x685ca621";a2xx.I61="0xf28bc7ad";b2xx.j7y="0x5078920d";c2xx.x2h="0x365a6c36";h2xx.o9b="7608";Z2xx.j6W=10689;T2xx.C1U="0xac5656fa";Z2xx.f1b="2400";K2xx.T60=0x1b6725ba;Z2xx.H1b="8546";Z2xx.s6W=10733;k4vv.s8Z=2429;l2xx.R40="0xcad731dc";k2xx.C35="0xc6";C2xx.x2W=8770;a2xx.H61=0xccaa4d54;W2xx.y95="2299";P2xx.W5h="0xdede79a7";Z2xx.h1b="6320";f2xx.g9U="0xf0a05050";Q2xx.t9Z=4140;B2xx.j2U="0x0e070709";b2xx.z5y="0x44663bc5";W2xx.b8k="2197";E2xx.Q4y="0x32";k2xx.w2y="0xf1";P2xx.S9h="0xfbfb16ed";c2xx.b2h="0xc35e9dc3";k4vv.C4Z=2571;E2xx.a4y="0x4e";g2xx.a8n=0x4f9aa883;c2xx.D2h="0x2f715e2f";I2xx.D3G="10597";B2xx.n2U="0x6834345c";G2xx.D3h=0x3c22e043;l2xx.N40="0x768b4329";h2xx.f9b="10569";m2xx.D1G="2687";c2xx.s8h="0x21634221";F2xx.c8G="5897";r2xx.F0U="0x59a1a1f8";U2xx.B41=0x8bc7adf2;E2xx.t8y="0x81";v2xx.K4z="6148";U2xx.h41="0x0efffbfd";I2xx.J5G="7850";C2xx.P8W=9277;s2xx.y5X="86";v2xx.p3z="8374";i2xx.C30="0xcaa6fc82";s2xx.S9X="8447";C2xx.e7V=8349;function M2xx(){}l2xx.v10="0x6c2bb316";c2xx.q3U="0xb7c275b7";P2xx.i6h="0xebeb26cd";m2xx.V6G="8456";l2xx.H40=0x8557f119;S2xx.E3b="8606";W2xx.s85="1133";M2xx.K81="0x79b492a7";o2xx.k1y="0xe1";s2xx.S6t="1936";G2xx.b3h=0x0d8652ec;h2xx.J6b="8222";o2xx.m6y="0x9c";r2xx.t1U="0x99c1c158";O2xx.A51="0xa0a2f355";f2xx.I7U="0x24381c1c";j2xx.v0h="0xbbd66dbb";I2xx.q3G="3751";M2xx.v21="0xab6bcb3b";k4vv.n3Q=1545;G2xx.O2r="0x83098086";M2xx.u21="0xbe832dd4";h2xx.g0b="10902";v2xx.j0z="10048";O2xx.x51="0xb3cf2512";T2xx.U8U="0x864343c5";K2xx.d90="0x8b880789";b2xx.M7y="0x223390ef";Q2xx.n4V=6075;B2xx.C2U="0x239c9cbf";E2xx.i4y="0x6d";I2xx.s5G="4739";u2xx.G6r="4692";F2xx.B2G="2080";s2xx.z8t="520";G2xx.T7h="0xe1e138d9";W2xx.Q7k="659";h2xx.X9b="6520";K2xx.q90="0x9e7767d9";C2xx.X6V=7275;s2xx.V9X="227";j2xx.S4h="0x4fd19e4f";T2xx.h1U="0xcfeaea25";W2xx.m9k="75";o2xx.v1y="0x1d";M2xx.y30="0x250cbce2";i2xx.Z30="0xd0b0e090";c2xx.m3U="0xb8d06868";P2xx.E5h=0x0b0b1d16;
User contributions licensed under CC BY-SA 3.0