Microsoft security software detects and removes this threat.

This family of rogue security programs pretend to scan your PC for malware, and often report lots of infections. The program will say you have to pay for it before it can fully clean your PC.

However, the program hasn't really detected any malware at all and isn't really an antivirus or antimalware scanner. It just looks like one so you'll send money to the people who made the program. Some of these programs use product names or logos that unlawfully impersonate Microsoft products.

Different brands of the rogues may modify various settings on your computer, end or close programs or system services, or block access to websites.

Find out ways that malware can get on your PC.

What to do now

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find other, hidden malware.

Advanced troubleshooting

To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.

Get more help

You can also ask for help from other PC users at the Microsoft virus and malware community.

If you’re using Windows XP, see our Windows XP end of support page.

Threat behavior

Win32/FakeSpypro has been distributed with many different names. The user interface and other details vary to reflect each variant's individual branding. These different distributions of the rogue use various installation methods, with file names and system modifications that can differ from one variant to the next.

FakeSpypro distributions affecting users in the wild:


Win32/FakeSpypro may be installed from the program's web site or by social engineering from third-party web sites. When run, Win32/FakeSpypro copies itself to %windir%\sysguard.exe and sets a registry entry to run itself at each system start:

Adds value: "system tool"
With data: "%windir%\sysguard.exe"
To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run

It drops a DLL component to "<system folder>\iehelper.dll" and sets the following registry values to load the dropped DLL at Windows start and to register the DLL component as a browser helper object or plug-in:

Adds value: "(default)"
With data: "bho"
To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}

Adds value: "(default)"
With data: "<system folder>\iehelper.dll"
To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}\InProcServer32

Adds value: "(default)"
With data: "0"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}

It also creates the following registry subkeys:

  • HKCU\Software\AvScan
  • HKCU\Software\AVSuite

Downloads files

Win32/FakeSpypro may download files from a particular URL. In the wild, it was observed downloading files from the domain. 

Displays misleading messages and alerts

When the trojan's executable, sysguard.exe, runs it displays the following interface:

The trojan regularly displays false warnings of malware infection:

It can also display pop-ups such as the following:

Moderates Internet use

The DLL <system folder>\iehelper.dll installed by Win32/FakeSpypro is used to observe your Internet usage. For example, it may modify search results for the following search engines, by appearing to direct you to

      • google

The site,, pretends to belong to Microsoft, however, it is used to distribute rogue security software. The site can appear similar to the following example:

The purpose of the message is to lure you to a page where you can purchase the rogue security product, such as the following:

Modifies hosts file

Win32/FakeSpypro modifies the Windows Hosts file. The local Hosts file overrides the DNS resolution of a web site URL to a particular IP address. Malicious software may make modifications to the Hosts file in order to redirect specified URLs to different IP addresses. Malware often modifies an affected machine's hosts file in order to stop users from accessing websites associated with particular security-related applications (such as antivirus software). 

Win32/FakeSpypro may modify the Hosts file under <system folder>\drivers\etc\hosts, to ensure that users visiting are directed to the listed IP address as in the following example:

Blocks web browsing

Win32/FakeSpypro modifies the registry so that the trojan runs as its own proxy server to manage Internet browsing.

Adds value: "ProxyServer"
With data: "http="
To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings

The trojan lets you use a web browser, but any attempts to visit websites result in the display of a false "Internet Explorer Warning" message such as the following:

Analysis by Wei Li


Symptoms vary among different distributions of Win32/FakeSpypro, however, the presence of the following system changes can indicate the presence of this program:
    • You have the following files, or similar:
      <system folder>\iehelper.dll
    • You have the following registry modifications or similar:

      Adds value: "system tool "
      With data: "%windir%\sysguard.exe",
      To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run

      Adds value: "(default)"
      With data: “bho”
      To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}

      Adds value: "(default)"
      With data: “<system folder>\iehelper.dll”
      To subkey: HKLM\SOFTWARE\Classes\CLSID\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}\InProcServer32

      Adds value: "(default)"
      With data: "0”,
      To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}
  • You see the following images/dialogs, or similar:


Alert level: High
This entry was first published on: May 25, 2010
This entry was updated on: Sep 05, 2014

This threat is also detected as:
  • FakeAlert-C.dr (McAfee)
  • SpywareProtect2009 (Symantec)
  • Troj/FakeAV-LS (Sophos)
  • Win32/Adware.SpywareProtect2009 (ESET)
  • Trojan.Win32.FraudPack.kho (Kaspersky)
  • Spyware Protect 2009 (other)
  • Antivirus System Pro (other)
  • Barracuda Antivirus (other)
  • Security Central (other)
  • Antivirus Soft (other)
  • Antivirus Suite (other)
  • Antivirus Live (other)
  • Antispyware Soft (other)
  • AV Security Suite (other)
  • Antivir Solution Pro (other)
  • Antivirus Action (other)
  • Antimalware Go (other)
  • AntiVira Av (other)
  • Antivirus .NET (other)
  • Antivirus Scan (other)