Hi everyone,
I'll be copying this other reply of mine on the AVG forum:
I know it might not be what you're
exactly looking for (since it's more probable you're being closely monitored as I am and this is only going to prevent you from viewing the window - check the address loaded on the pop-up, because it'll match a ton of your latest searches on Google), but, at least for now, you could edit the hosts file present at the path "C:\Windows\System32\drivers\etc" and block the address from being sucessfully opened. Remember you'll have to run the text editor (notepad, why not?) as an administrator and open the file through the own notepad prompt (ctrl + o). After this, go to the last line and create a new one with "127.0.0.1" (which is the localhost used for loopbacks; learn more at
https://en.wikipedia.org/wiki/Localhost) plus the address targeted. You also should preferably press the "tab" key to separate a parameter from each other.
It seems this threat actually comes from some kind of action triggered by Crosspilot. Discussions are being proposed across other forums too, I see.
Hope this helps.
(I attached a sample of what it also looks when running on AVG. Same deal, same issue.)