How to remove FakeAV.AUQD

A few days ago, on the AVG antivirus support site, as well as on many other sites and forums dedicated to viruses, there began to appear complaints about an unknown FakeAV.AUQD virus that emerges when scanning with the AVG antivirus. None of the users noticed any impact on the system from this virus, but the antivirus program continued to identify this virus again and again as a threat. In addition, AVG could not remove this virus. The most interesting thing is that the virus, apparently, settled in one of the most harmless programs - in Notepad.exe. Each of us has used this program many times and knows that it can not harm the computer. What is the reason for this behavior of a worthy antivirus program?

As explained by AVG support staff, a massive transfer of customers from version 2016 to version 2017 is currently underway, with the automatic update of the 2016 version disabled. If you use AVG 2016 antivirus software, we advise you to completely remove it and all its components from the computer, and then download the new version from the official antivirus site. Having done this and making a scan you will see that the threat has disappeared.

There are several possible reasons for this incident. First, the cause may be some error in the code that leads to such a false alarm, and this error was corrected in the last update. The second option is much more interesting - AVG developers could deliberately create this problem in order to stimulate users to switch to a more modern version of the antivirus. This version is also supported by the fact that similar problems were encountered before: Qihoo 360 TS also defined Notepad.exe as a threat, but could not remove it, and the problem was also solved in a large-scale update of the program. Anyway, if you suddenly see FakeAV.AUQD in the scan results - be aware that this is just a mistake, and your computer is out of danger.

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.