The results from reformatted sites are different from normal or infected ones.
Hidden files got me:
Deep in the recesses of the infected site, you find a few hidden directories that seem to be handling the actual processing. It's quite a treasure trove, really.
You found: 4 versions of networking code
You found: 4 pieces of viral code
You found: 2 lists of infection attempts
You found: automation routine
You found: 2 file interfaces
Deep in the recesses of the infected site, you find a few hidden directories that seem to be handling the actual processing. It seems to be mostly logs of bad access attempts on other sites. You copy them down for reference.
You found: infection attempts
Deep in the recesses of the infected site, you find a few hidden directories that seem to be handling the actual processing. You copy over the files that look like they might be useful.
You found: file interface