It is used to silently install malware onto the website visitor's system.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
It downloads and executes the following file upon successful exploitation: