1) Did running Tails in virtual machine leave any traces on the hard drive? and if yes what it will be enough to do to erase that traces?
2) When i trying to running Tails from virtual machine Tor did not work to me and before i moved to the 13.0 version its worked to me good in the last version before 13.0, what can be the problem?
3) I read about it ans still can't understand the risk of use Tails from virtual machine. can you explain me and tell me what is more secure, to use Tails from virtual machine? or running Tor normally from regular operating system? because i want to know what is better option for me to use Tails from this 2 options.
Thank you for any help!

I need more information to all my 3 questions please if anyone here can help me. to know if Tails leave traces is not enough information.
1.a Probably (NB: "pagefile" and "hiberfile")
1.b.i (Probably) Boot into a real OS, shred the "pagefile" and "hiberfile" files, then securely erase free space.
1.b.ii (Certainly) Destroy the HD
2. Probably a VM network config problem. Does the "unsafe browser" work? Please explicitly describe "does not work".
3. A nebulous "more secure" does not mean anything. Secure against what? e.g. Booting Tails on bare metal is less likely to leave traces of the session on the machine (no swap, proper memory wiping, etc) and will not be exposed to the keyloggers viruses and other crap infecting your (windows) host... however, if you managed to get your Tails session pwned, being sandboxed inside a VM could make it more difficult for your adversary to compromise your system (access your other OS's data, install rootkits, whatever)
not-op
regarding the answer to question 3 (and the others I guess) Would the most secure option of all be getting rid of windows, installing qubes, running multiple tails from qubes in a vm for each contextual identity? Or would the tails session still leave traces on the qubes os? Never tried qubes, just curious about the synergy here..