Suspicious code at site and former bad web rep site

See:/page/js/interface1.2/interface.js
(* JQuery NewWave cross-platform library for touch, mouse and motion events oriented towards live performance) * note by me, pol
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.
Details: Too low entropy detected in string [['.={:(){ .((){(!.||!.); =;.={:.||,:.,:.,:.||'',:.||'',:.%26%26 .==''?.:,:.%26%26 .==''?.:,:.%26%26 .=='']] of length 38118 which may point to obfuscation or shellcode. * could also be used in XSS attack. * note by me, pol
Threat dump: see: http://jsunpack.jeek.org/?report=066cba89f867b20f7cb3717b212f6855415f237d (userscript?)
(view in browser with NS and RP extensions active and in a sandbox)
File size[byte]: 79402
File type: ASCII
MD5: B2C874F2FBC32F79827C967D0D28F868
Scan duration[sec]: 1.128000
Malware in another domain on IP now closed or dead: http://support.clean-mx.de/clean-mx/viruses.php?sort=firstseen%20desc&domain=www.coselasiapms.com
Therefore IP address has been identified as risky by one/more sources see: http://zulu.zscaler.com/submission/show/cf66af6de5ee308446619be64b46ace1-1382565660

polonus