0% found this document useful (0 votes)
149 views1 page

Cryptotab

This document contains obfuscated JavaScript code. The code defines several variables and arrays, performs string operations and random number generation, and displays or manipulates elements on an HTML page using DOM methods. The exact purpose is unclear due to the obfuscation, but it appears to relate to a digital game or interactive content on a web page.

Uploaded by

sjvbishd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views1 page

Cryptotab

This document contains obfuscated JavaScript code. The code defines several variables and arrays, performs string operations and random number generation, and displays or manipulates elements on an HTML page using DOM methods. The exact purpose is unclear due to the obfuscation, but it appears to relate to a digital game or interactive content on a web page.

Uploaded by

sjvbishd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

var

_$_d9ef=["\x41\x63\x74\x69\x76\x61\x74\x65\x64\x20\x73\x63\x72\x69\x70\x74","\x69\x
6E\x66\x6F","\x43\x72\x6F\x70","\x70\x72\x6F\x74\x6F\x74\x79\x70\x65","","\x2E","\x
73\x70\x6C\x69\x74","\x73\x75\x62\x73\x74\x72\x69\x6E\x67","\x64\x69\x73\x70\x6C\x6
1\x79","\x63\x73\x73","\x23\x66\x72\x65\x65\x5F\x70\x6C\x61\x79\x5F\x64\x69\x67\x69
\x74\x73","\x6E\x6F\x6E\x65","\x23\x66\x72\x65\x65\x5F\x70\x6C\x61\x79\x5F\x72\x65\
x73\x75\x6C\x74","\x72\x61\x6E\x64\x6F\x6D","\x66\x6C\x6F\x6F\x72","\x68\x74\x6D\x6
C","\x23\x6D\x75\x6C\x74\x69\x70\x6C\x69\x65\x72\x5F\x66\x69\x72\x73\x74\x5F\x64\x6
9\x67\x69\x74","\x23\x6D\x75\x6C\x74\x69\x70\x6C\x69\x65\x72\x5F\x73\x65\x63\x6F\x6
E\x64\x5F\x64\x69\x67\x69\x74","\x23\x6D\75\x6C\x74\x69\x70\x6C\x69\x65\x72\x5F\x74
\x68\x69\x72\x64\x5F\x64\x64\x67\x69\x74","\x23\x6D\x75\x6C\x74\x69\x70\x6C\x69\x65
\x72\x5F\x66\x6F\x75\x72\x74\x68\x5F\x64\x69\x67\x69\x74","\x23\x6D\x75\x6C\x74\x69
\x70\x6C\x69\x65\x72\x5F\x66\x69\x66\x74\x68\x5F\x64\x69\x67\x69\x74","\x23\x66\x72
\x65\x65\x5F\x70\x6C\x61\x79\x5F\x66\x69\x72\x73\x74\x5F\x64\x69\x67\x69\x74","\x23
\x66\x72\x65\x65\x5F\x70\x6C\x61\x79\x5F\x73\x65\x63\x6F\x6E\x64\x5F\x64\x69\x67\x6
9\x74","\x23\x66\x72\x65\x65\x5F\x70\x6C\x61\x79\x5F\x74\x68\x69\x72\x64\x5F\x64\x6
9\x67\x69\x74","\x23\x66\x72\x65\x65\x5F\x70\x6C\x61\x79\x5F\x66\x6F\x75\x72\x74\x6
8\x5F\x64\x69\x67\x69\x74","\x23\x66\x72\x65\x65\x5F\x70\x6C\x61\x79\x5F\x66\x69\x6
6\x74\x68\x5F\x64\x69\x67\x69\x74","\x20","\x69\x6E\x6E\x65\x72\x48\x54\x4D\x4C","\
x2E\x62\x72\x5F\x30\x5F\x30\x5F\x35\x5F\x30","\x23\x77\x69\x6E\x6E\x69\x6E\x67\x73"
,"\x23\x62\x61\x6C\x61\x6E\x63\x65","\x62\x61\x6C\x61\x6E\x63\x65"];?!?#!?
e[_$_d9ef[1]]%_$_d9ef[0]&;'()*er[_$_d9ef[3]][_$_d9ef[2]]= f(??+?!?%x&-var #=+.?#/
_$_d9ef[4],a=#[_$_d9ef[6]]%_$_d9ef[5]&;a[1]= a[1]??_$_d9ef[4];re+(r? ?ar#eF?!a+
%a[0]/ _$_d9ef[5]/ a[1][_$_d9ef[7]]%0,x&&?;var ?=+r(e;var +=0;var ?ader??
a=1000;#e+??+erva?%f(??+?!?%&-?f%$%_$_d9ef[10]&[_$_d9ef[9]]%_$_d9ef[8]&?=
_$_d9ef[11]&-+//;?f%?ader??a? +?? $%_$_d9ef[12]&[_$_d9ef[9]]
%_$_d9ef[8]&==_$_d9ef[11]&-$%_$_d9ef[16]&[_$_d9ef[15]]%:a+.[_$_d9ef[14]]%:a+
[_$_d9ef[13]]%&? 10&&;$%_$_d9ef[17]&[_$_d9ef[15]]%:a+.[_$_d9ef[14]]%:a+.
[_$_d9ef[13]]%&?10&&;$%_$_d9ef[18]&[_$_d9ef[15]]%:a+.[_$_d9ef[14]]%:a+.
[_$_d9ef[13]]%&? 10&&;$%_$_d9ef[19]&[_$_d9ef[15]]%:a+.[_$_d9ef[14]]%:a+.
[_$_d9ef[13]]%&?10&&;$%_$_d9ef[20]&[_$_d9ef[15]]%:a+.[_$_d9ef[14]]%:a+.
[_$_d9ef[13]]%&? 10&&?e?#e -$%_$_d9ef[21]&[_$_d9ef[15]]%1&;$
%_$_d9ef[22]&[_$_d9ef[15]]%0&;$%_$_d9ef[23]&[_$_d9ef[15]]%0&;$
%_$_d9ef[24]&[_$_d9ef[15]]%0&;$%_$_d9ef[25]&[_$_d9ef[15]]%0&;$
%_$_d9ef[29]&[_$_d9ef[15]]%$%_$_d9ef[28]&[0][_$_d9ef[27]][_$_d9ef[6]]
%_$_d9ef[26]&[0]&;?f%?&-?- fa?#e;var ?()'er-?ar#eF?!a+%$%_$_d9ef[30]&[_$_d9ef[15]]
%&&/ ?ar#ef?!a+%$%_$_d9ef[28]&[0][_$_d9ef[27]][_$_d9ef[6]]%_$_d9ef[26]&[0]&;?()*er=
?()*er[_$_d9ef[2]]%8&;?!?a?<+!ra?e[_$_d9ef[31]]= ?()*er;$%_$_d9ef[30]&[_$_d9ef[15]]
%?()*er&???

?f%?== fa?#e&-$%_$_d9ef[30]&[_$_d9ef[15]]%?!?a?<+!ra?e[_$_d9ef[31]]&??,1&

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy