It is possible that your System is infected. Try scanning your system with one of the tools provided by Symantec.
<a href=”http://www.symantec.com/security_response/malware.jsp”>1. The Power Eraser Tool eliminates deeply embedded and difficult to remove threats that traditional virus scanning doesn’t always detect.</a>
2. If you have access to Fileconnect, the <a href=”http://www.symantec.com/business/support/index?page=content&id=TECH131732&locale=en_US”>SERT (Symantec Endpoint Recovery Tool)</a> is useful in situations where computers are too heavily infected for the Symantec Endpoint Protection client installed upon them to clean effectively. The Consumer version of this tool is the <a href=”http://security.symantec.com/nbrt/nbrt.aspx?lcid=1033&serviceid=na&pname=na&pversion=na&origin=olhelp&env=prod&layout=esd&osver=na&vendorid=na&ispid=na”>Norton Bootable Recovery Tool</a>. The tool is free, so there is no need for a Fileconnect account to download the software.
3. <a href=”http://www.symantec.com/business/support/index?page=content&id=TECH141402″>The Load point Analysis Tool</a> generates a detailed report of the programs loaded on your system. It is helpful in listing common loadpoints where threats can live.
4. There are several <a href=”http://www.symantec.com/security_response/removaltools.jsp”>Threat-Specific Removal Tools</a> provided by Security Response.
If you are unable to remove the threat(s) from your systems, please submit the suspected files to <a href=”http://www.symantec.com/security_response/submitsamples.jsp”>Symantec Security Response </a>or <a href=”http://www.threatexpert.com/submit.aspx”>ThreatExpert </a>for analysis. New signatures will be created, and included in future definition sets for detection.