The file has gone, but there was a registry item left behind, that is what SAS found, the registry item in isolation without the file is inert. What SAS found was the run command for the file, without the file it can't run anything.
Avast doesn't specifically scan the registry, if it finds spyware it does try to find any associated registry entry, in this case it wasn't found, but the most important part the file was.
So this wasn't in the chest as it is a registry entry not removed by avast.
In the file properties, avast also displays the file name, and the path on separate lines, see image. The file name is also displayed in the chest itself before you check the properties. You didn't say if you actually have an acer computer (?). All of which contribute to whether it is a legit file with a legit purpose on your acer (?) computer and is used for good not evil (the double edged intent, one you want to keep the other you don't).
After any keylogger infection it is advisable to change passwords certainly any banking ones, followed by email accounts, then any you consider confidential, etc. those with a higher degree of severity should be done soonest, and the remainder when you have time.
The one thing about keyloggers is that they gather information, but essential to that is they have to get that information out and this is where a good firewall comes into play to block unauthorised outbound connections. So what is your firewall ?