We kind of noticed that by comparing the behaviour of our (locally) fully trusted setup compared to unsigned setups from other sources (like the mentioned setup from Miranda IM). The question is less aimed at the signing itself, but rather at the: What would we have to change for Avast to recognize our setup not as suspicious enough to trigger a double deepscreen (and potentially Access Violate the InnoSetup). The last copy&paste answer I got refered me to report a false positive… but is that even correct? I never mentioned it actually reporting it any error, it just uses deepscreening on our setup in a really annoying and error prone way which obviously would not strengthen the trust of our potential customers in our software.

PS: For Avast support members interested into looking into more private informations about the setup or want to answer in a more private manner can lookup either the ticket:
https://support.avast.com/support/tickets/10882
https://support.business.avast.com/hc/en-us/requests/49359 (seems the ticket has been marked deleted for me now?!)