It is used to silently install malware onto the website visitor's system.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
It downloads and executes the following file upon successful exploitation:
Date Created: -
Date Last Modified: -