Excessive header information:
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Fri, 16 Aug 2013 07:50:56 GMT
Pragma: no-cache
Location: /index.php?secc=contacto
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Content-Length: 0
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=12c718f0d171a39f0fa0c6deb26300d0; path=/
X-Powered-By: PHP/5.2.17
3 security warnings here:
https://asafaweb.com/Scan?Url=www.microelectronicash.comPrevious compromise of domain on same IP via /.sys?getexe=v2webserver.exe or /.sys?getexe=v2prx.exe or /.sys?getexe=ms.26.exe
reported here:
http://www.malwaredomainlist.com/forums/index.php?topic=3190.2615see:
http://exploitsdownload.com/search/dork%20sql%20injection%202013/90Flagged
</div>
<div class="coldos">
<div class="modulo">
<a href="index.php?keyword=PELTIER&secc=catalogo">
<div id="imghome03">
</div>
IP 1 appearance(s) in spam e-mail or spam post url
<embed width="340" height="50" src="images/banner-logos.swf" quality="high"
pluginspage="htxp://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash"
type="application/x-shockwave-flash">
</embed>
source of malcode ? catalog/view/javascript/DD_belatedPNG_0.0.8a-min.js
polonus