Send the sample to virus@avast.com zipped and password protected with the password in email body, a link to this topic might help and possible false positive in the subject.
Or you can also add the file to the User Files (File, Add) section of the avast chest (if it isn't already there) where it can do no harm and send it from there (select the file, right click, email to Alwil Software). No need to zip and PW protect when the sample is sent from chest. A copy of the file/s will remain in the original location, so any further action you take can remove that.
This is the bast way to have the file analysed and the VPS corrected for all users of avast and vundofix. I don't know what might be in the innards of vundofix, perhaps some signatures that are used to detect vundo and these could be the issue. However it still needs to be analysed.
I see from you results that avast isn't alone in its detection, though most are either heuristic or generic detections.