As part of our security system we encrypt some of the DLLs in the install folder. The random bytes created by the encryption can occasionally match some pattern that AV software is looking for. There really isn’t much we can do about it because it's randomly generated and not the actual code. The easiest way to avoid this is to just white list VRD so your AV ignores it. Alternatively you can submit it to AVG as a false positive and they should fix their definitions eventually. We could rebuild (maybe DanR will) but because it's random it might fix the alert on those specific ones but create an alert for others. It really is just a crap shoot for us.