Pastebin launched a little side project called VERYVIRAL.com, check it out ;-) Want more features on Pastebin? Sign Up, it's FREE!
Guest

is this malicious?

By: a guest on Jan 15th, 2013  |  syntax: None  |  size: 0.93 KB  |  views: 252  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. <script type='text/javascript'><!--//<![CDATA[
  2. var m3_u = (location.protocol=='https:'?'https://d.adsbyi
  3. socket.com/ajs.php':'http://d.adsbyisocket.com/ajs.php');
  4. var m3_r = Math.floor(Math.random()*99999999999);
  5. if (!document.MAX_used) document.MAX_used = ',';
  6. document.write ("<scr"+"ipt type='text/javascript' src='"
  7. +m3_u);
  8. document.write ("?zoneid=4459&block=1");
  9. document.write ('&cb=' + m3_r);
  10. if (document.MAX_used != ',') document.write ("&exclude="
  11. + document.MAX_used);
  12. document.write (document.charset ? '&charset='+document.c
  13. harset : (document.characterSet ? '&charset='+document.chara
  14. cterSet : ''));
  15. document.write ("&loc=" + escape(window.location));
  16. if (document.referrer) document.write ("&referer=" + esca
  17. pe(document.referrer));
  18. if (document.context) document.write ("&context=" + escap
  19. e(document.context));
  20. if (document.mmm_fo) document.write ("&mmm_fo=1");
  21. document.write ("'><\/scr"+"ipt>");
  22. //]]>--></script>