Thanking everybody for such tremendous effort and action. EFTP3 Client, Server and Service uses UPX (the Ultimate Packer for eXecutables) version 1.25, and alot of other software, including virusses/trojans/spyware et cetera, will use this or similar technologies to make their software harder to detect. UPX compresses and encrypts the executable in question, and when it is launched it is decrypted and inflated into memory. EFTP uses UPX for security reasons, to make it harder to reverse engineer as well as to make it small enough to fit on floppy disks or memory cards.
What's happened here is that the trojan W32:Delf-ZT has probably been UPX'ed, and by some chance there is a string of code which is the same in my product and the trojan, and this is the string that Avast is checking against.
This will be the third false positive we've had so far, and in my experience the reporting software is soon rectified.
Once again, thanks to everybody for your efforts so far, and especially to the various people who have taken it upon themselves report this on my behalf.