This one is a bit tricky to decode in Malzilla ,but you don't need "lastmodified" property.
I recommend a Javascript debugger like Google Chromes' integrated debugger. It's much easier than decoding in Malzilla
in this case.
This sample is tricky because you may not modify the code. Lines of decoding code are part of the algorithm.
You get a rubbish result if you modify the function "bMVFunc". But you have to modify this function ,because
Malzilla doesn't accept the original code ("qOGet is not a function").
Solution for Malzilla:
-Make a copy of the main function "bMVFunc",paste it and rename it to "bMVFunc2"
-modify function "bMVFunc2",replace "var qOGet = nInM["uEn6eJsEcEadpJeJ".replace(/[J68Ed]/g, new String)];" by "var qOGet = unescape;"
-modify "bMVFunc(arrayWGetD);" to "bMVFunc2(arrayWGetD);"
-run the script and you'll get the exploit code for a single exploit
-download the next exploit from url at the end of the page (e.g.index.php?exp=2) and repeat all the steps above until you have decoded all exploits
modified version of your sample attached