AVG moves executable to quarantine
RafalSkolasinski opened this issue · comments
Rafal Skolasinski commented
Even ENTEM commented
There is not much I can do about it unfortunately.
The executable uses functions to access and modify another and that's usually considered suspicious behavior. Big apps can do that without troubles since they can pay for a certificate..
The only way in this case is to put it in the exclusion list of avg or disable live protection when patching.