This program delivers advertising content to the user. It is usually annoying but harmless, unless it is combined with spyware or trackware.
Based on the settings of your F-Secure security product, it may block the file from running, move it to the quarantine where it cannot spread or cause harm, or ask you to select an action.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Superjuan is an adware that is installed as a Browser Helper Object (BHO).
The dll file is usually located in the windows system folder with a random file name and implements the following autorun entries:
While active, the adware can perform the& following actions:
The adware also lowers the Security level settings on Microsoft Internet Explorer's Security Zones.
The adware tracks search queries made on a defined list of strings, then either displays adware or redirects the query. The adware tracks queries made on these websites:
When the user searches on a defined website, the adware may contact a server to obtain an address or data containing an advertisement. The adware then launches a new web browser instance, which is in this format:
Where [Address] is an IP address or domain returned by a contacted server, giving the location of advertisement data.
The searches made by the user may also be redirected to the following address:
Where [Address] in this case is dependent on a hard coded variant. Some possible addresses are:
The adware is known to be associated with several rogue applications. The adware may redirect the user to an online scanning website, which may trick the user into installing a rogue application. Some representative screenshots of rogue applications can be seen below:
Several variants of these rogue applications may also contact a website containing a script that downloads and execute a rogue installer program.
During installation, several registry entries may be temporarily created, in order to facilitate the adware's tracking functionality.
It adds the DLL file name ton the Appinit startup:
And keys to register the adware as a Browser Helper Object (BHO):
These are the CLSID that the adware may use: