Our application was detected as IDP.Generic, but IDP.Generic no longer occurs for unknown reasons

Hello Taiki,
We are sorry for the inconvenience.
We understand that your application has been flagged by AVG as it occurs whenever the file does something identical to malware that triggers the flag.

We advise you to follow the below article to whitelist your application:
AVG Threat Lab - File whitelisting (https://support.avg.com/SupportArticleView?l=en&urlName=AVG-Threat-Lab-file-whitelist&q=whitelisting&supportType=home).

Thank you for your understanding.

Hello Taiki,
We are sorry for the inconvenience.
We understand that your application has been flagged by AVG as it occurs whenever the file does something identical to malware that triggers the flag.

We advise you to follow the below article to whitelist your application:
AVG Threat Lab - File whitelisting (https://support.avg.com/SupportArticleView?l=en&urlName=AVG-Threat-Lab-file-whitelist&q=whitelisting&supportType=home).

Thank you for your understanding.

My application was detected as IDP.Generic.
After investigating the cause, it was found that IDP.Generic has two condition.
1. Differences in digital signatures
2. Differences in PowerShell commands used in the application

1. Differences in digital signatures
I tried digital signatures from two publishers.
- "Symantec Class 3 SHA256 Code Signing CA"
- "DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1"

2. Differences in PowerShel commands used in the application
I tried two PowerShell command options.
- "-ExecutionPolicy Bypass with -Command"
- "-ExecutionPolicy Bypass with -EncodedCommand"

Of these two condition, IDP.Generic only occurred with "DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1" and "-ExecutionPolicy Bypass with -EncodedCommand".

The last time I confirmed the occurrence of IDP.Generic was on 2021/12/20.
According to the latest virus definition, IDP.Generic does not seem to occur even with "DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1" and "-ExecutionPolicy Bypass with -EncodedCommand".
However, to prevent the recurrence of IDP.Generic, I would like to know why the application was detected as IDP.Generic.

P.S.
I'm asking another thread about the difference in PowerShell command options because I'm having a different issue than IDP.Generic.
ref AVG Support Community | User Forum for All AVG products