Well actually I wanted to find out if my AV would detect it or not, which is why I downloaded it. Bitdefender did detect it, but only when I right-clicked the file and scanned it, even though I have real-time scanning active. SuperAntiSpyware plain missed it, and Malwarebytes' Anti-Malware did give a message once. Bitdefender on the other hand just ate up the file. I thought SuperAntiSpyware and Malwarebytes were the best apps for dealing with such stuff. Or are there better ones? Anyway, I've deleted the file from my computer now.
Now in this case, I myself downloaded the keylogger so it wouldn't send off any logs anywhere. But if a keylogger was sent to me by someone, and it remote installed itself, it might be able to sneak out the logs. The thing is that I've come across places on the net where they give tutorials on how to bind the keylogger to a file, preferably exe, but even jpeg images work. So you get an image attached in your email, and you download it, and as soon as you open it, the image opens but at the same time the keylogger stealthily installs. And I download too much stuff from my mails... Yahoo does scan it first, but not sure what they use and how effective it is.
By the way, even though I've uninstalled the Ardamax keylogger and even run the specific uninstalling app available at their website, I feel it might have left a trace somewhere. Any exact way to find out, or any behaviour I should watch out for?
Edited by HydraHeaded, 25 November 2008 - 11:06 AM.