Website is malware infested...spamsite!

See: https://www.virustotal.com/nl/url/d1f755f350f2a7e630473f1dae4e5f2c7e81be914d31de72026fed3d3762045f/analysis/1448383318/
Nothing detected: http://quttera.com/detailed_report/adza.com.mx & http://killmalware.com/adza.com.mx/replying.php
Sucuri detects: https://sitecheck.sucuri.net/results/adza.com.mx
Site error detected. Details: http://sucuri.net/malware/php-error-fatal-error?v7
Warning: require_once(/home4/axis013/public_html/adza.com.mx/wp-includes/wp-db.php): failed to open stream: No such file or directory in /home4/axis013/public_html/adza.com.mx/wp-includes/load.php on line 345

http://www.domxssscanner.com/scan?url=http%3A%2F%2Fadza.com.mx%2Freplying.php

WordPress Version
4.0.8

Warning Directory Indexing Enabled
In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/ enabled
/wp-content/plugins/ enabled
Directory indexing was tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.
Version does not appear to be latest 4.3.1 - update now.

Bitdefender GTrafficLight blocks site. hostgator abuse → 10 red out of 10 website risk status: http://toolbar.netcraft.com/site_report?url=http://adza.com.mx
DNS errors and fail: http://www.dnsinspect.com/adza.com.mx/1448383947
Name Servers Versions
WARNING: Name servers software versions are exposed:
162.144.0.106: “9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.4”
50.87.150.206: “9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.4”
Exposing name server’s versions may be risky, when a new vulnerability is found your name servers may be automatically exploited by script kiddies until you patch the system. Learn how to hide version.
RBL Check
FAIL: We found blacklisted mail servers:
192.232.216.203
zen.spamhaus.org. → http://www.spamhaus.org/query/bl?ip=192.232.216.203

polonus (volunteer website security analyst and website error-hunter)

https://www.virustotal.com/en/file/bf029b75211990faa937238369641e58ca6ad0a1c61737616859dbca9120f432/analysis/1448386217/