Microsoft security software detects and removes this threat.
This family of rogue security programs falsely claim that your PC is infected with malware. They encourage you to pay for a product to remove the "threats" from your PC.
These programs can show you misleading alerts and false detections in order to convince you to buy illegitimate security software.  Some of these programs use product names or logos that unlawfully impersonate Microsoft products. 

What to do now

The following free Microsoft software detects and removes this threat:

Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.

Advanced troubleshooting

To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.

You can also ask for help from other PC users at the Microsoft virus and malware community.

If you’re using Windows XP, see our Windows XP end of support page.

Additional remediation instructions for this threat

This threat might make lasting changes to your PC's settings that won't be restored when it's cleaned. The following steps can help change these settings back to what you want:

Threat behavior

Win32/FakeSpypro has been distributed with many different names. The user interface and other details vary to reflect each variant's individual branding. These different distributions of the rogue use various installation methods, with file names and system modifications that can differ from one variant to the next.

FakeSpypro distributions affecting users in the wild:


Win32/FakeSpypro may be installed from the program's web site or by social engineering from third-party web sites. When run, Win32/FakeSpypro copies itself to %windir%\sysguard.exe and sets a registry entry to run itself at each system start:

Adds value: "system tool"
With data: "%windir%\sysguard.exe"
To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run

It drops a DLL component to "<system folder>\iehelper.dll" and sets the following registry values to load the dropped DLL at Windows start and to register the DLL component as a browser helper object or plug-in:

Adds value: "(default)"
With data: "bho"
To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}

Adds value: "(default)"
With data: "<system folder>\iehelper.dll"
To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}\InProcServer32

Adds value: "(default)"
With data: "0"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}

It also creates the following registry subkeys:

  • HKCU\Software\AvScan
  • HKCU\Software\AVSuite

Downloads files

Win32/FakeSpypro may download files from a particular URL. In the wild, it was observed downloading files from the domain. 

Displays misleading messages and alerts

When the trojan's executable, sysguard.exe, runs it displays the following interface:

The trojan regularly displays false warnings of malware infection:

It can also display pop-ups such as the following:

Moderates Internet use

The DLL <system folder>\iehelper.dll installed by Win32/FakeSpypro is used to observe your Internet usage. For example, it may modify search results for the following search engines, by appearing to direct you to

      • google

The site,, pretends to belong to Microsoft, however, it is used to distribute rogue security software. The site can appear similar to the following example:

The purpose of the message is to lure you to a page where you can purchase the rogue security product, such as the following:

Modifies hosts file

Win32/FakeSpypro modifies the Windows Hosts file. The local Hosts file overrides the DNS resolution of a web site URL to a particular IP address. Malicious software may make modifications to the Hosts file in order to redirect specified URLs to different IP addresses. Malware often modifies an affected machine's hosts file in order to stop users from accessing websites associated with particular security-related applications (such as antivirus software). 

Win32/FakeSpypro may modify the Hosts file under <system folder>\drivers\etc\hosts, to ensure that users visiting are directed to the listed IP address as in the following example:

Blocks web browsing

Win32/FakeSpypro modifies the registry so that the trojan runs as its own proxy server to manage Internet browsing.

Adds value: "ProxyServer"
With data: "http="
To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings

The trojan lets you use a web browser, but any attempts to visit websites result in the display of a false "Internet Explorer Warning" message such as the following:

Analysis by Wei Li


Symptoms vary among different distributions of Win32/FakeSpypro, however, the presence of the following system changes can indicate the presence of this program:
    • You have the following files, or similar:
      <system folder>\iehelper.dll
    • You have the following registry modifications or similar:

      Adds value: "system tool "
      With data: "%windir%\sysguard.exe",
      To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run

      Adds value: "(default)"
      With data: “bho”
      To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}

      Adds value: "(default)"
      With data: “<system folder>\iehelper.dll”
      To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}\InProcServer32

      Adds value: "(default)"
      With data: "0”,
      To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}
  • You see the following images/dialogs, or similar:


Alert level: High
This entry was first published on: May 25, 2010
This entry was updated on: May 20, 2014

This threat is also detected as:
  • FakeAlert-C.dr (McAfee)
  • SpywareProtect2009 (Symantec)
  • Troj/FakeAV-LS (Sophos)
  • Win32/Adware.SpywareProtect2009 (ESET)
  • Trojan.Win32.FraudPack.kho (Kaspersky)
  • Spyware Protect 2009 (other)
  • Antivirus System Pro (other)
  • Barracuda Antivirus (other)
  • Security Central (other)
  • Antivirus Soft (other)
  • Antivirus Suite (other)
  • Antivirus Live (other)
  • Antispyware Soft (other)
  • AV Security Suite (other)
  • Antivir Solution Pro (other)
  • Antivirus Action (other)
  • Antimalware Go (other)
  • AntiVira Av (other)
  • Antivirus .NET (other)
  • Antivirus Scan (other)