Siberia Exploit Kit
After I remove all the bogus comments and beautify the code, this is the result:
The code returns the deobfuscated PDF redirect script in lala0 then it creates a for-next loop. On its first iteration, a new function is created and returns the result of lala0 into lala1. It keeps doing this over and over. Here's how it looks like:
At the end of the loop cycle, the last line of the script evals lala45() which executes the deobfuscated PDF redirect script and sends the user to page with the Acrobat exploit. In fact, calling any one of these functions will eventually execute the redirect that was defined by the first lala0 function.