For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.
GO TO: Summary | Removal | Technical Details
Classification
Category:
Spyware
Type:
Adware
Platform:
W32
Aliases:
-
This program delivers advertising content to the user. It is usually annoying but harmless, unless it is combined with spyware or trackware.
Based on the settings of your F-Secure security product, it may block the file from running, move it to the quarantine where it cannot spread or cause harm, or ask you to select an action.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note You need administrative rights to change the settings.
Knowledge Base
Find the latest advice in our Community Knowledge Base.
User Guide
See the user guide for your product on the Help Center.
Contact Support
Chat with or call an expert for help.
Submit a file or URL for further analysis.
Superjuan is an adware that is installed as a Browser Helper Object (BHO).
The dll file is usually located in the windows system folder with a random file name and implements the following autorun entries:
While active, the adware can perform the& following actions:
The adware also lowers the Security level settings on Microsoft Internet Explorer's Security Zones.
The adware tracks search queries made on a defined list of strings, then either displays adware or redirects the query. The adware tracks queries made on these websites:
When the user searches on a defined website, the adware may contact a server to obtain an address or data containing an advertisement. The adware then launches a new web browser instance, which is in this format:
Where [Address] is an IP address or domain returned by a contacted server, giving the location of advertisement data.
The searches made by the user may also be redirected to the following address:
Where [Address] in this case is dependent on a hard coded variant. Some possible addresses are:
The adware is known to be associated with several rogue applications. The adware may redirect the user to an online scanning website, which may trick the user into installing a rogue application. Some representative screenshots of rogue applications can be seen below:
Several variants of these rogue applications may also contact a website containing a script that downloads and execute a rogue installer program.
During installation, several registry entries may be temporarily created, in order to facilitate the adware's tracking functionality.
It adds the DLL file name ton the Appinit startup:
And keys to register the adware as a Browser Helper Object (BHO):
These are the CLSID that the adware may use: