Unknown_html_RFI_shell on site...

See: https://www.virustotal.com/nl/url/cc062f05fa5433abf8adb5c7dcbfa17aa8bcad8809fd0ff570b6f555ab5f6944/analysis/1421943071/

Security Header Insecurities: https://www.uploady.com/#!/download/ybI8JXOxGEk/PKMUsCgvM7LtGNoe
Minor issues: ww.dnsinspect.com/805locksmiths.com/1421943215
Potentially suspicious file: s-passets-cache-ak0.pinimg.com/webapp/js/app/common/external-2.f037a88b.js
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.
Details: Too low entropy detected in string [[‘@undefinedkeyframes . { {:;:;:;:;:;0:;:;:;:;0:;0:;:;:;:;:;:;:;:;:;0:;:;0:;:;:;:;:;0:;:;:;:;:;:;:;:;:’]] of length 101 which may point to obfuscation or shellcode.
Threat dump: View code http://jsunpack.jeek.org/?report=0ce6a86b8f5b417b816029f0da981313a030fd4e
Threat dump MD5: F2148132BCE80C37CA2FB4C669A619F0
File size[byte]: 138416
File type: ASCII
Page/File MD5: A2B90B641C3EC72B17AD1C9AE3228787
Scan duration[sec]: 9.791000

Quttera blacklisted external links and domains/hosts
Read on error in code: Stackoverflow.com/questions/11215185/syntaxerror-missing-after-element-list-when-using-eval

polonus