1. Symantec/
  2. Security Response/
  3. Adware.Raxums

Adware.Raxums - Removal

February 13, 2007 11:36:50 AM
Risk Impact:
File Names:
varies sys.reg
Systems Affected:

The following instructions pertain to all Symantec antivirus products that support Security Risk detection.
  1. Update the definitions.
  2. Delete the values that were added to the registry.
  3. Run a full system scan and delete all the files detected as Adware.Raxums.
For specific details on each of these steps, read the following instructions.

1. Updating the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. Deleting the values from the registry

WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.
  1. Click Start, and then click Run. (The Run dialog box appears.)
  2. Type regedit

    Then click OK. (The Registry Editor opens.)

  3. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main

  4. In the right pane, delete the value:

    "HOMEOldSP"="http:/ /%62%6A%76%76%68%6B%2E%74%2E%6D%75%78%61%2E%63%63/%68%2E%70%68%70?%61%69%64=33"

  5. Navigate to the key:

    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main

  6. In the right pane, delete the value:

    "HOMEOldSP"="http:/ /%62%6A%76%76%68%6B%2E%74%2E%6D%75%78%61%2E%63%63/%68%2E%70%68%70?%61%69%64=33"

  7. Navigate to the key:


  8. In the right pane, delete the value:

    "sys"="regedit -s sys.reg"

  9. Exit the Registry Editor.

  10. Restart the computer.

3. Scanning for and deleting the files
  1. Start your Symantec antivirus program, and then run a full system scan.
  2. If any files are detected as Adware.Raxums click Delete.

    Note: If your Symantec antivirus product reports that it cannot delete a detected file, write down the path and file name. Then use Windows Explorer to locate and delete the file.

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube