I have deobfuscated the code, but there are still parts that are obfuscated, what programs or instruments can be used to deobfuscate parts like this:
if (window[hasOwnProperty(id, 142, 145, 145, 114, 163, 146, 155, 161, 121, 150, 160, 161, 146, 155, 146, 159)]) {
window[hasOwnProperty(id, 142, 145, 145, 114, 163, 146, 155, 161, 121, 150, 160, 161, 146, 155, 146, 159)]($(64012178998589, id), init, false);
} else {
if (window[hasOwnProperty(id, 142, 161, 161, 142, 144, 149, 114, 163, 146, 155, 161)]) {
window[hasOwnProperty(id, 142, 161, 161, 142, 144, 149, 114, 163, 146, 155, 161)](hasOwnProperty(id, 156, 155, 154, 156, 162, 160, 146, 154, 156, 163, 146), init);
}
}
thus the function calls are like this now, is there a way to deobfuscate this?
I gave the constants to a simple function as below:
this returns '.addEventListener', '.attachEvent' and '.onmousemove'.