一个 js 文件,压缩后变量名变成了这样 _0x2070a8
不知道通过怎样压缩文件会变成这样
_0xada194['prototype'][_0xe6b908(0xae8)] = function(_0x352e09, _0x43a698, _0x3d5495, _0x44b2b4) {
var _0x29ac70 = _0xe6b908, _0x1ea332, _0x4e1fed, _0x42b1dc = this[_0x29ac70(0x5a3)][_0x29ac70(0x38ce)]({
'url': _0x29ac70(0x9de) + _0x3d5495 + '/' + _0x43a698 + '/' + _0x352e09,
'request': _0x44b2b4
}), _0x3a6800 = this[_0x29ac70(0x104a)], _0x24a530 = _0x3e99bb[_0x29ac70(0xd0d)](!0x0);
_0x3a6800 && !_0x16e377(_0x296331(this, _0x3d5495 + 0x1, 0x2 * _0x352e09, 0x2 * _0x43a698)) && (_0x24a530 = (_0x1ea332 = _0x260221(this, _0x3d5495 + 0x1, 0x2 * _0x352e09, 0x2 * _0x43a698))['promise'],
_0x4e1fed = _0x1ea332[_0x29ac70(0x16f6)]),
_0x42b1dc = _0x42b1dc[_0x29ac70(0x376c)]();
if (_0x16e377(_0x42b1dc) && _0x16e377(_0x24a530)) {
var _0x348b7c = this
, _0x2648aa = this['_tilesAvailable'];
return _0x3e99bb[_0x29ac70(0x31fb)](_0x42b1dc, _0x24a530)['then'](function(_0x5bcc87) {
var _0x12f707 = _0x29ac70;
return new _0x2cbc3d({
'buffer': _0x5bcc87[0x0],
'width': _0x348b7c[_0x12f707(0xf6)],
'height': _0x348b7c[_0x12f707(0x4935)],
'childTileMask': _0x3a6800 ? _0x2648aa[_0x12f707(0xa81)](_0x3d5495, _0x352e09, _0x43a698) : _0x336bce,
'structure': _0x348b7c[_0x12f707(0x44ab)],
'encoding': _0x348b7c[_0x12f707(0xc2f)]
});
})[_0x29ac70(0x2c00)](function(_0x200299) {
var _0x10504f = _0x29ac70;
return _0x16e377(_0x4e1fed) && _0x4e1fed[_0x10504f(0x3f86)] === _0xdf316d[_0x10504f(0x4ea7)] ? (_0x44b2b4['cancel'](),
_0x44b2b4[_0x10504f(0x4cc9)][_0x10504f(0x245a)][_0x10504f(0x5b3)](function() {
var _0x2e45ee = _0x10504f;
return _0x44b2b4['state'] = _0xdf316d['CANCELLED'],
_0x3e99bb[_0x2e45ee(0x119b)](_0x200299);
})) : _0x3e99bb[_0x10504f(0x119b)](_0x200299);
});
}
}
这个叫混淆. 里面类似
_0xXXXX
的其实就是普通的js变量, 只是让人难以理解, 对计算机无影响.搜一下, 工具有很多.
JavaScript Obfuscator
看起来混淆效果和你发的一样.