very carefully - if someone is going to this much trouble to obfuscate the code, it is probably some kind of attack script
you can output the results of execution in stages using a local html file, and take it a piece at a time
doing this i get:
var jQuery = "eval(" +
'w;iLn0d;opw;.0epv_a_l;'.replace(/[;0_pL]/g, '') +
");";
document.writeln('jQuery=' + jQuery);
which yields
jQuery=eval(window.eval);
which, as crescentfresh observed, binds the variable jQuery to the window.eval function.
the next section is obviously trying to eval something in hex code, so let's see what the hex code string looks like (reformatted manually for presentation purposes):
function g4LZ(s9QNvAL)
{
function eDdqkXm(fX09)
{
var uaWG=0;
var jtoS=fX09.length;
var aCD6=0;
while(aCD6wQ5.length)
d971I=0;
if(f234SD>lIXy6md.length)
f234SD=0;
kyCyJ+=String.fromCharCode(nCV2eO^ocx) + '';
}
eval(kyCyJ);
return kyCyJ=new String();
}
catch(e){}
}
g4LZ('%33...%5e');
and now we've got an escaped string at the end, let's see what's in there using unescape (truncated for presentation):
30248118GA0* l: WRG:nt9*82:)7Z\uF%*{...
frankly, i'm getting bored taking this apart, so instead i dumped it into a local html file, disconnected from the internet, opened firefox, disabled javascript, loaded the file in firefox, turned on firebug, reloaded the page so it would run, and inspected the DOM.
the script creates an IFRAME with SRC set to [altered for safety!]:
http://4b3b9e839fd84e47 [DO NOT CLICK THIS URL] .27f721b7f6c92d76.axa3.cn/elanguage.cn/
axa3.cn is a chinese domain on the malware blacklist