Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Mouse initializing problem


  • This topic is locked This topic is locked
8 replies to this topic

#1 likuid99

likuid99

  • Members
  • 49 posts
  • OFFLINE
  •  
  • Local time:07:40 AM

Posted 07 November 2009 - 02:08 PM

Windows XP Pro - SP3

My main concern is that my mouse has been uninitializing and reconnecting randomly. This has been happening mostly while playing poker online, I will be in a hand and unable to use my mouse for several seconds. It will reconnect then immediately disconnect multiple times, sometimes not coming back until I manually unplug and re-insert my mouse cord. This does not always work. I have also been getting popups and browser lockups when viewing videos.

I have recieved help here before and Kaspersky used to have a free scan available so I attempted to start there, it seems that feature is gone? I downloaded the free trial and ran a scan but the report was basically useless so I uninstalled it.

Thanks to all again for previous and hopefully current help.

I ran DDS and Rootrepeal as suggested, here are my logs:


DDS (Ver_09-10-26.01) - NTFSx86
Run by Cisco at 1:11:03.12 on Thu 11/05/2009
Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.540 [GMT -6:00]

AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Symantec Client Firewall *enabled* {5CB76A43-5FAD-476B-B9FF-26FA61F13187}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Symantec Client Security\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec Client Security\Symantec Client Firewall\ISSVC.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\Symantec Client Security\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Symantec Client Security\Symantec Client Firewall\SymSPort.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\SYMANT~2\VPTray.exe
C:\WINDOWS\system32\CTHELPER.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre6\bin\jusched.exe
F:\Program Files\Firefox\firefox.exe
C:\Program Files\Java\jre6\bin\jucheck.exe
C:\WINDOWS\system32\wscntfy.exe
C:\DOCUME~1\Cisco\LOCALS~1\Temp\jre-6u17-windows-i586-iftw-rv.exe
F:\Download - Firefox\dds(2).scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\symant~2\VPTray.exe
mRun: [WINDVDPatch] CTHELPER.EXE
mRun: [UpdReg] c:\windows\UpdReg.EXE
mRun: [Jet Detection] "c:\program files\creative\sblive\program\ADGJDet.exe"
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
dRunOnce: [RunNarrator] Narrator.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - f:\program files\aim\aim.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {31E68DE2-5548-4B23-88F0-C51E6A0F695E} - hxxps://support.microsoft.com/OAS/ActiveX/odc.cab
DPF: {57C76689-F052-487B-A19F-855AFDDF28EE} - hxxps://securera.edwardjones.com/vdesk/terminal/f5InspectionHost.cab#version=6020,2008,0122,2004
DPF: {7E73BE8F-FD87-44EC-8E22-023D5FF960FF} - hxxps://securera.edwardjones.com/vdesk/terminal/vdeskctrl.cab#Version=6020,2008,0122,2006
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://javadl.sun.com/webapps/download/AutoDL?BundleId=26688
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CC85ACDF-B277-486F-8C70-2C9B2ED2A4E7} - hxxps://securera.edwardjones.com/vdesk/terminal/urxshost.cab#version=6020,2008,0122,2005
DPF: {E0FF21FA-B857-45C5-8621-F120A0C17FF2} - hxxps://securera.edwardjones.com/vdesk/terminal/urxhost.cab#version=6020,2008,0122,2004
DPF: {E615C9EA-AD69-4AE9-83C9-9D906A0ACA6D} - hxxps://securera.edwardjones.com/policy/download_binary.php/win32/f5syschk.cab#Version=6020,2008,0122,2007
Notify: NavLogon - c:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\cisco\applic~1\mozilla\firefox\profiles\0p7l4jbw.default\
FF - prefs.js: browser.search.selectedEngine - Food Network - Recipes
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/ig?hl=en&source=iglk
FF - plugin: f:\program files\firefox\plugins\npunagi2.dll
FF - plugin: f:\program files\firefox\plugins\NPuroamHost.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - f:\program files\firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-8-28 102448]
S3 SavRoam;SAVRoam;c:\program files\symantec client security\symantec antivirus\SavRoam.exe [2005-11-15 169200]

=============== Created Last 30 ================

2009-10-21 01:05:12 87280 ----a-w- c:\windows\system32\wsatrace.dll
2009-10-21 00:39:14 464128 ----a-w- c:\windows\system32\csimxctl.ocx

==================== Find3M ====================

2009-09-25 05:37:11 667136 ----a-w- c:\windows\system32\wininet.dll
2009-09-25 05:37:09 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 21:03:36 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-08-26 08:00:21 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-20 23:52:26 784402 ----a-w- c:\windows\system32\xa.tmp

============= FINISH: 1:11:46.90 ===============



ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/11/05 01:14
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF55DE000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7A95000 Size: 8192 File Visible: No Signed: -
Status: -

Name: hiber_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\hiber_WMILIB.SYS
Address: 0xF7A61000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF1D7F000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\documents and settings\e\local settings\temp\etilqs_ilagvyv0rb2r14bcmcgw
Status: Allocation size mismatch (API: 32768, Raw: 0)

SSDT
-------------------
#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x85fb5440

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\Program Files\Symantec\SYMEVENT.SYS" at address 0xf5af3dc0

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\Program Files\Symantec\SYMEVENT.SYS" at address 0xf5af4020

==EOF==

BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:40 AM

Posted 11 November 2009 - 04:52 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#3 likuid99

likuid99
  • Topic Starter

  • Members
  • 49 posts
  • OFFLINE
  •  
  • Local time:07:40 AM

Posted 11 November 2009 - 06:59 PM

Im here.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:40 AM

Posted 11 November 2009 - 08:42 PM

Hi Likuid99,

My first thoughts were that this isn't malware-like symptoms and the logs are clean.

However, I would like to run some further scans to check this

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
That should give us any clues to what may be going on. In the meantime I'm going to research mouse problems. :(
Posted Image
m0le is a proud member of UNITE

#5 likuid99

likuid99
  • Topic Starter

  • Members
  • 49 posts
  • OFFLINE
  •  
  • Local time:07:40 AM

Posted 12 November 2009 - 06:42 PM

Malwarebytes' Anti-Malware 1.41
Database version: 3155
Windows 5.1.2600 Service Pack 3

11/12/2009 3:49:56 PM
mbam-log-2009-11-12 (15-49-56).txt

Scan type: Full Scan (C:\|F:\|)
Objects scanned: 200290
Time elapsed: 56 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)




SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 11/12/2009 at 05:23 PM

Application Version : 4.30.1004

Core Rules Database Version : 4266
Trace Rules Database Version: 2150

Scan type : Complete Scan
Total Scan Time : 01:28:59

Memory items scanned : 488
Memory threats detected : 0
Registry items scanned : 5458
Registry threats detected : 5
File items scanned : 67418
File threats detected : 41

Adware.Tracking Cookie
C:\Documents and Settings\Cisco\Cookies\cisco@cdn.at.atwola[1].txt
C:\Documents and Settings\Cisco\Cookies\cisco@html[2].txt
C:\Documents and Settings\Cisco\Cookies\cisco@atwola[1].txt
C:\Documents and Settings\Cisco\Cookies\cisco@tacoda[2].txt
C:\Documents and Settings\Cisco\Cookies\cisco@at.atwola[1].txt
C:\Documents and Settings\E\Cookies\e@247realmedia[1].txt
C:\Documents and Settings\E\Cookies\e@ad.yieldmanager[2].txt
C:\Documents and Settings\E\Cookies\e@adlegend[2].txt
C:\Documents and Settings\E\Cookies\e@ads.bridgetrack[2].txt
C:\Documents and Settings\E\Cookies\e@ads.pointroll[1].txt
C:\Documents and Settings\E\Cookies\e@adserver.adtechus[1].txt
C:\Documents and Settings\E\Cookies\e@advertising[2].txt
C:\Documents and Settings\E\Cookies\e@apmebf[2].txt
C:\Documents and Settings\E\Cookies\e@at.atwola[1].txt
C:\Documents and Settings\E\Cookies\e@atdmt[2].txt
C:\Documents and Settings\E\Cookies\e@atwola[2].txt
C:\Documents and Settings\E\Cookies\e@bs.serving-sys[2].txt
C:\Documents and Settings\E\Cookies\e@cdn.at.atwola[2].txt
C:\Documents and Settings\E\Cookies\e@content.yieldmanager[1].txt
C:\Documents and Settings\E\Cookies\e@doubleclick[1].txt
C:\Documents and Settings\E\Cookies\e@interclick[1].txt
C:\Documents and Settings\E\Cookies\e@media.photobucket[1].txt
C:\Documents and Settings\E\Cookies\e@media6degrees[2].txt
C:\Documents and Settings\E\Cookies\e@mediaplex[2].txt
C:\Documents and Settings\E\Cookies\e@msnbc.112.2o7[1].txt
C:\Documents and Settings\E\Cookies\e@msnportal.112.2o7[1].txt
C:\Documents and Settings\E\Cookies\e@oasc12.247realmedia[1].txt
C:\Documents and Settings\E\Cookies\e@pointroll[1].txt
C:\Documents and Settings\E\Cookies\e@questionmarket[1].txt
C:\Documents and Settings\E\Cookies\e@realmedia[2].txt
C:\Documents and Settings\E\Cookies\e@revsci[2].txt
C:\Documents and Settings\E\Cookies\e@rotator.adjuggler[1].txt
C:\Documents and Settings\E\Cookies\e@server.iad.liveperson[1].txt
C:\Documents and Settings\E\Cookies\e@serving-sys[2].txt
C:\Documents and Settings\E\Cookies\e@specificmedia[2].txt
C:\Documents and Settings\E\Cookies\e@statcounter[1].txt
C:\Documents and Settings\E\Cookies\e@statse.webtrendslive[2].txt
C:\Documents and Settings\E\Cookies\e@tacoda[1].txt
C:\Documents and Settings\E\Cookies\e@trafficmp[1].txt
C:\Documents and Settings\E\Cookies\e@tribalfusion[1].txt
C:\Documents and Settings\E\Cookies\e@zedo[1].txt

Rogue.Component/Trace
HKLM\Software\Microsoft\E0E2E4CC
HKLM\Software\Microsoft\E0E2E4CC#e0e2e4cc
HKLM\Software\Microsoft\E0E2E4CC#Version
HKLM\Software\Microsoft\E0E2E4CC#e0e2494c
HKLM\Software\Microsoft\E0E2E4CC#e0e220a9

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:40 AM

Posted 13 November 2009 - 10:22 PM

Possible registry alterations but not definitely malware.

Have you checked that it isn't the mouse by plugging in another one?


You state you have been getting popups and browser lock ups when viewing videos. Browsers stalling when playing videos is pretty common but the popups may also be a feature that the website itself has built in.

Can you describe the popups that you are getting.
Posted Image
m0le is a proud member of UNITE

#7 likuid99

likuid99
  • Topic Starter

  • Members
  • 49 posts
  • OFFLINE
  •  
  • Local time:07:40 AM

Posted 16 November 2009 - 12:36 AM

I don't have another mouse but I did try plugging it into a USB port and the same thing happened. If I unplugged it and reconnected the mouse it would work right away, but then almost immediately stop working. I haven't had the problem since posting it here, the issue only came up 3-4 times before I came here. Maybe it was premature to assume something was wrong, but the issue only occurred while I was playing poker, and as soon as I closed the program I could use my mouse again. Just got me worried that my pc had been compromised.

The popups are likely just like you said and something I have to deal with. Adverts and extra tabs/windows that open. The lockups happened when multiples came up and I couldn't close them. Right clicking on the taskbar to try to close them almost never works, but viewing the popup and using the [X] does. Ending the process usually killed every browser.

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:40 AM

Posted 16 November 2009 - 03:28 PM

From what you're saying the pop ups and browser stalls are connected to some of the sites you visit. Your AV is Symantec Corporate and I'm unsure of the pop-up protection on that package.

I would be interested to see what a different mouse would do.

What I am sure of is that you have a clean machine and so this topic has reached its end.

I will leave it open for five days in case anything further develops.

Cheers,

m0le
Posted Image
m0le is a proud member of UNITE

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:40 AM

Posted 21 November 2009 - 04:30 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. :(

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users