Some antiviruses look for patterns and sequences of activities an application would perform. They use that unique series of activities or events as something specific to a virus or trojan file.
For example in the picture above your application is detected as Trojan Drop something... a dropper is an application which contains inside the application another application which gets dropped into the computer.
So you launch the application (let's say a game trainer or serial number generator and in the background the application extracts another application and hides it in the computer to run the next time you start the pc.
The application you have may have a very similar behavior built in, like maybe it asks you at some point "Do you want to just run me, or do you want to install myself" or maybe it asks you if you want to create shortcuts on desktop or programs menu ... both of these behaviors involve copying itself or extract files from itself just like a dropper trojan does .... so the antivirus may detect the same pattern of instructions in the application and think it's the same application as another virus.
Other droppers simply have a sequence of instructions to download a bigger file from the internet ... for example pick a random link from a list of links stored inside the application, check a page to get information about what virus or trojan to download and from where to download that file, then download the actual virus into the computer.
Your application may have a similar pattern to perform updates ... the application may download a small file to check if there's new versions available and then have code to download the installer from the internet ... this pattern of instructions may be similar to how a known trojan / virus works so it's falsely detected as virus.