javascript – XSS in a variable assignment when ” are escaped


SCENARIO:

user input is reflected inside a variable.
For example

url.com/?a=hello

is reflected as shown below

var test="hello";

I tried to evade from the variable with payload like hello"; or hello%22; or hello%2522; but unsuccessfully.
All these characters are reflected without encoding: .[]{};:{}/?|_-+ so i can use them

Is there another way to exploit this situation?