46040 characters, with no line break of malcoded Blackhole Exploit Kit...

Flagged here: htxp://urlquery.net/report.php?id=63808
IDS alerts for:
Blackhole Exploit Pack Binary Load Request, Blackhole - Payload Download,
Blackhole Java Exploit request to /Set.jar, Exploit Kit Delivering JAR Archive to Client
& Blackhole Exploit Kit Driveby ?page Download Secondary Request
malicious: Alert detected /alert CVE-2010-0249 MSIEUseAfterFree (CreateElement called 16381 times) /alert CVE-2006-0003 shellexecute with ./…/c63ee70.exe
reported to virus AT avast dot com, see: htxp://vscan.urlvoid.com/analysis/b684910063996b78608fbc4fecb6a79b/ZGlyZWN0LXBocA==/
To be protected update your java software,

polonus

VirusTotal
https://www.virustotal.com/file/a507b212a59715345949cc859c14d42dff3d42b39744a4bf3331188b632003dc/analysis/1338919459/

Same obfuscation method here: http://forum.avast.com/index.php?topic=99293.0

F-Prot detects “maxorder” packer