Hello, Ryan.
We'll certainly look into it. Could you confirm if the issue still persists? Please provide a screenshot (http://avgclick.me/getscreenshot) of the detection pop up. Click on 'Answer' & then click on the 'Image' [mountain symbol] & follow the instructions.
Looked at the extensive process, including needing to signup for a whitelist account before I can even upload the file. I've spent far too long on this already - I gave you the steps to do all this yourself, I'm beyond caring, I'll use a different AV.
Thank you so much for providing us the screenshot.
Yes, this might be a false alert. We request you to submit this Laragon setup file to AVG developers to analyse and to white list the program.
Please use this link ( https://www.avg.com/en-ww/whitelist-program-application ) to upload the setup file to our developers for analysis.
Hi, yes, it's still an issue. The Laragon install came from https://laragon.org/download/ - choosing option 1 under PHP.
Two days ago, I opened a terminal window from within Laragon 3.4 and I got an AVG popup relating to cmd.exe; I installed 3.5 and still get the same issue, but I guess that was unlikely to change the underlying cause. I installed Malwarebytes and it doesn't find any issues across my system, which possibly corroborates this being a false positive. If I instead run cmd.exe myself, I do not get a popup - only when Laragon initiates it.
Threat name: IDP.ALEXA.51
Process: C:\Windows\System32\cmd.exe
Detected by: Behaviour Shield
The only option I have is to quarantine it - I do that and it says I am protected, but a) cmd.exe remains in system32 folder and b) quarantine is empty, as if nothing occurred. All very fishy. Looks like an AVG goof to me. If I scan cmd.exe directly, it finds nothing wrong.
Hello, Ryan.
We'll certainly look into it. Could you confirm if the issue still persists? Please provide a screenshot (http://avgclick.me/getscreenshot) of the detection pop up. Click on 'Answer' & then click on the 'Image' [mountain symbol] & follow the instructions.
Hi, the binary is 76MB (mb3-setup-consumer-3.6.1.2711-1.0.482-1.0.7589) - please ask them on my behalf to download the file using the url I listed.
Ryan, we realize the situation.
From the URL that you provided, we will not be able to get the information.
Instead, you can upload the application through our FTP for which refer this article.
Once it is uploaded, provide the file name here.
Ryan, we apologize for the inconvenience caused.
Please refer to the instructions given in this article to upload the file to our FTP server and these instructions won't be so complicated as the previous one.
Please upload the file to our FTP server and provide us the exact name of the file to locate this on our end.
Looked at the extensive process, including needing to signup for a whitelist account before I can even upload the file. I've spent far too long on this already - I gave you the steps to do all this yourself, I'm beyond caring, I'll use a different AV.
Thank you so much for providing us the screenshot.
Yes, this might be a false alert. We request you to submit this Laragon setup file to AVG developers to analyse and to white list the program.
Please use this link ( https://www.avg.com/en-ww/whitelist-program-application ) to upload the setup file to our developers for analysis.