This program delivers advertising content to the user. It is usually annoying but harmless, unless it is combined with spyware or trackware.
Based on the settings of your F-Secure security product, it may block the file from running, move it to the quarantine where it cannot spread or cause harm, or ask you to select an action.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Superjuan is an adware that is installed as a Browser Helper Object (BHO).
The dll file is usually located in the windows system folder with a random file name and implements the following autorun entries:
While active, the adware can perform the& following actions:
The adware also lowers the Security level settings on Microsoft Internet Explorer's Security Zones.
The adware tracks search queries made on a defined list of strings, then either displays adware or redirects the query. The adware tracks queries made on these websites:
When the user searches on a defined website, the adware may contact a server to obtain an address or data containing an advertisement. The adware then launches a new web browser instance, which is in this format:
Where [Address] is an IP address or domain returned by a contacted server, giving the location of advertisement data.
The searches made by the user may also be redirected to the following address:
Where [Address] in this case is dependent on a hard coded variant. Some possible addresses are:
The adware is known to be associated with several rogue applications. The adware may redirect the user to an online scanning website, which may trick the user into installing a rogue application. Some representative screenshots of rogue applications can be seen below:
Several variants of these rogue applications may also contact a website containing a script that downloads and execute a rogue installer program.
During installation, several registry entries may be temporarily created, in order to facilitate the adware's tracking functionality.
It adds the DLL file name ton the Appinit startup:
And keys to register the adware as a Browser Helper Object (BHO):
These are the CLSID that the adware may use:
Ask questions in our Community.
Check the user guide for instructions.
Chat with with or call an agent.
Submit a file or URL for analysis.