Each file starts with the same function:
(function(_0x128f83, _0x1ae5b9) { var _0x1b5471 = function(_0x339be5) { while (--_0x339be5) { _0x128f83['push'](_0x128f83['shift']()); } }; _0x1b5471(++_0x1ae5b9); }(_0xf75e, 0xc2)); var _0x4e13 = function(_0x24c6e1, _0x3b52a9) { _0x24c6e1 = _0x24c6e1 - 0x0; var _0xc16529 = _0xf75e[_0x24c6e1]; return _0xc16529; }; 'use strict'; Object[_0x4e13('0x0')](exports, '__esModule', { 'value': !![] }); I did some research and have come to the conclusion that the code was obfuscated with a library similar to obfuscator.io. My question is how do i decode the hexadecimal values, as many of the variables in the file are reliant on them (e.g. const electron_1 = require(_0x4e13('0x1'));). Any feedback would be much appreciated.