"http://127.0.0.1/" is your own computer, hence the loopback (if you didnt know).
You could have a trojan, I would run a full scan of windows defender, Microsoft security essentials, and malware bytes.
I would also be interested to see what your hosts file looks like, its loacated at: C:\Windows\System32\drivers\etc (you can open it with notepad).
Any line with a # in the front, is ignored, so the file should be empty or like this:
Code:
# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost
If there is a bunch of trash in there, you can delete it. Chris actually has had more end-user experience with stuff like this lately, my job has been more server related, so maybe he can chime in.
_________________
-- .:Splak|StackableNut --Cornholio wrote:
blah thats nothing, i built houses for pirates, then do pirating myself. Then I shoot my self and perform bullet removal surgery on myself. After that I go to boot camps to train kids to kill. Then i go and fight on the Iraq war for both sides. After all i go later and drink some 7up cause ill be thirsty as shit.