Local Host still goes to vv6.s13.topx.cc
mtrox
Minnesota
Guys, newbie here. Great site. Sorry if you all know this one....I did do a search. I'm on a client's computer that used to have Kazaa. I'd rebuild the thing but it's an HP with the hidden partition and no XP disks unless you wrestle it out of them (that alone is reason to tell people to avoid HP's in my book).
I downloaded AboutBuster and went through all the steps. Not sure if I've got it licked. Time will tell.
However, when I plug the local host into the address bar of I Expl (127.0.0.1) I still go to Search For.... crap. The hosts file is fine. Anyone know how to get the loopback fixed so that I don't keep going to vv6.s13.topx.cc? Please don't tell me to use Mozilla. This guy is intimidated enough without that wrinkle.
Thanks for your help.
I downloaded AboutBuster and went through all the steps. Not sure if I've got it licked. Time will tell.
However, when I plug the local host into the address bar of I Expl (127.0.0.1) I still go to Search For.... crap. The hosts file is fine. Anyone know how to get the loopback fixed so that I don't keep going to vv6.s13.topx.cc? Please don't tell me to use Mozilla. This guy is intimidated enough without that wrinkle.
Thanks for your help.
0
This discussion has been closed.
Comments
Pretty uneventful log I'm afraid.
Logfile of HijackThis v1.97.7
Scan saved at 3:18:27 PM, on 10/14/2004
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\HiJackThis\HijackThis.exe
C:\WINDOWS\system32\wuauclt.exe
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
O16 - DPF: {33564D57-0000-0010-8000-00AA00389B71} - http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB
O16 - DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} (Office Update Installation Engine) - http://office.microsoft.com/officeupdate/content/opuc.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
O16 - DPF: {9F1C11AA-197B-4942-BA54-47A8489BB47F} - http://v4.windowsupdate.microsoft.com/CAB/x86/unicode/iuctl.CAB?38118.5010300926
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
O16 - DPF: {E93A6FCA-C052-45DF-AC9B-B729066092F8} (Util Class) - https://isupport4.hp.com/motivedocs/linklauncher/MotUtil.cab
I've killed everything in HiJack log, run CWShredder (3 times), AboutBuster (6 times now), and am clean of the coolsearch crap. But my loopback address still got me to some dumb "Searching for..." page. 127.0.0.1 got me there every time.
Finally went into the registry, exported a few Microsoft URL Hook type keys and now when I plug in the loopback address, I get this in the address bar:
[url]http:///? 127.0.0.1[/url]
And nothing in the IExplorer window.
It has never shown up as a BHO or in any other way in Highjackthis. The home page isn't highjacked. I got that solved. Just the loopback address is highjacked. Hosts file is clean.
This is the third time I've worked on this guy's computer, and although I knew I had the highjacker out of there, I wasn't going to give it back to him on the off chance he'd get led back to the seach page that started it all.
Thanks for your time. That Adware Away worked great!!