the method is _process_json is bug : because certainly Obfuscators code
partial code of method
Before bug fix
try {
a && a.xmlDoc ? eval("data=" + a.xmlDoc.responseText + ";") : typeof a == "string" && eval("data=" + a + ";")
} catch (b) {
dhtmlxError.throwError("LoadXML", "Incorrect JSON", [a.xmlDoc || a, this]), a = {rows: []}
}
After bug fix
try {
// fix data -> a in eval function
a && a.xmlDoc ? eval("a=" + a.xmlDoc.responseText + ";") : typeof a == "string" && eval("a=" + a + ";")
} catch (b) {
// LoadXML -> LoadJSon
dhtmlxError.throwError("LoadJSON", "Incorrect JSON", [a.xmlDoc || a, this]), a = {rows: []}
}