/home/bdqbpbxa/rc-subdomains/waykay-rc.goodface.com.ua/wp-content/themes/waykay/header.php
<!DOCTYPE html>
<html lang="es">
  <head>

    <title>
      <?php echo wp_get_document_title(); ?>
    </title>    

      <!-- TODO: Set absolute page URL -->
      <link rel="canonical" href="<?php echo get_permalink(); ?>">

      <!-- Mobile -->
      <meta name="viewport"
        content="width=device-width, initial-scale=1, maximum-scale=1, minimum-scale=1, user-scalable=no">
      <meta name="format-detection" content="telephone=no">

    <?php wp_head(); ?>

  </head>
<body>

  <style>
      .preloader {
        position: fixed;
        z-index: 500;
        left: 0;
        top: 0;
        right: 0;
        bottom: 0;
        display: block;
        background: #000;
        overflow: hidden;
        opacity: 0;
        pointer-events: none;
        transition: opacity 0.4s;
      }

      .preloader.-visible {
        opacity: 1;
        pointer-events: auto;
        padding-right: 17px;
      }
  </style>


  <div class="preloader -visible">
  </div>

  <script>

    // Allow animations if JS support is enabled

    document.body.classList.add('-allow-animations');
  </script>

<?php
  $header = get_field('header', 'options');
?>
<header class="header">
	<div class="container">
    <div class="header__wrapper">
		<a href="#hero" class="logo">
			<img src="<?php echo $header['logo']['url']; ?>" alt="<?php echo $header['logo']['alt']; ?>">
		</a>
		<nav class="header__navigation">
      <?php
        foreach($header['navigation'] as $link) :
          $prepared_link = get_link_group_field($link['link']);
          if ($prepared_link) :
      ?>
			  <a class="default-link link-text mob-link-text" href="<?php echo $prepared_link['url']; ?>" <?php echo $prepared_link['target']; ?>><?php echo $prepared_link['title']; ?></a>
      <?php
          endif;
        endforeach;
      ?>
		</nav>
      </div>
	</div>
</header>
<script>
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
</script>