Haven't we been there before but then with an AVG inheritance:
https://support.avg.com/answers?id=9060N000000Ph8mQAC
Just wait for a reply from avast team whether this is a genuine detection or a so-called false positive find.
It is only avast team that can come up with a decisive answer here.
polonus
That is a very old topic March 2018, so 4 years old.
That said, the location C:\Users\L***y\AppData\Local\Temp\_avg_\unp197163290.tmp\4.doc, based on the location and filename \unp197163290.tmp, this appears to be where temp downloaded files are scanned (same as in Avast).
This area however, is generally cleared after scans are completed successfully (see attached image), so other than the malware name, that may be the only coincidence.
@ guitarhero, we need a location of where this detection was made and the file name otherwise we are just guessing.
As for the malware name, just working from general computing knowledge, OLE (Object Linking and Embedding) would generally be found in the likes of a Word (or similar) Office type Document, to insert something into that document via the Remote Template Injection.
So something could be remotely embedded in the file/document. What that might be I have no idea.