How to remove InfoKeeper [Removal Guide]

What is InfoKeeper?

InfoKeeper is a fake system security software that is considered as a Rogue. Rogues are malicious programs that hackers use to trick users by displaying false threats and problems that it claims to have detected. In reality, none of the issues are real and are only used to convince the user into buying their software and stealing their personal financial information

Am I infected?

This is a screenshot of this rogue.



.jpg  infokeeper.jpg (Size: 52.98 KB / Downloads: 0)

Removal Instructions
(If you experience any problems completing these instructions, please start a new thread here)

1. Restart your computer. As soon as your computer turns on, tap F8 until you reach the Advance Boot Menu. Use the arrow keys and select Safe Mode with Networking .

2. Download and run RKill.

Download mirror 1Download mirror 2Download mirror 3

  • Save it to your Desktop.
  • Double click the RKill desktop icon.
  • It will quickly run and launch a log. If it does not launch a log, try another download link until it does.

(This tools will kill the rogue’s process temporarily. As a result, act quickly and move on to the next step.)

3. Download Malwarebytes’ Anti-Malware to your desktop. [Image: 1208__malwarebytes.png]

  • Rename the file to firefox.exe BEFORE downloading
  • Double-click firefox.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes’ Anti-Malware
    • and Launch Malwarebytes’ Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.

    [Image: 42456544.jpg]

  • Once the program has loaded, select Perform full scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.

    [Image: 55713761.jpg]

  • Be sure that everything is Checked (ticked) and click on Remove Selected.
  • Reboot your computer if prompted.

Malwarebytes should completely remove this infection however you can also download other free anti-malware softwares from the list below and run a full system scan to make sure that your computer is clean.
SUPERAntispyware Free*
Hitman Pro 3.5
*Note : Remember to update the definitions before starting a scan.
If you are still experiencing problems on your machine, please start a new thread here.

How was I infected?

  • Rogues can get on to computers without the user’s consent through Drive-by downloads. When a user visits a compromised or infected website, the site immediately checks for any security vulnerabilities on the machine to inject the malicious code.
  • Peer-to-peer (P2P) programs utorrent, Limewire, and Kazaa are frequently used by hackers to distribute malware
  • Hackers can also trick the user into downloading a file, saying it is a legitimate file needed to view a video or pictures.

How can I prevent these infections?

1. Keep Your System Updated

  • Microsoft releases patches for Windows and Office products regularly to patch up Windows and Office product bugs and vulnerabilities. Please ensure you update your system regularly.

    To update Windows and Office

    1. Go to Start > Control Panel > Automatic Updates
    2. Select Automatic (recommended) if you want the updates to be downloaded and installed without prompting you.
    3. Select Download updates for me, but let me choose when to install them button if you want the updates to be downloaded automatically but to be installed at another time.

To manually update Windows,

    Start Internet Explorer. Go to Tools > Windows Update

2. Keep your Antivirus up-to-date

Make sure that you update your antivirus, firewall and anti-spyware programs regularly. If you don’t have an antivirus, download any one of the following:

3. Avoid Peer-to-peer programs

  • Peer-to-peer programs are legitimate but the files shared are extremely dangerous. Hackers often use fake file names to trick users into downloading malware.

4. Switch your browser

  • Firefox is a more secure, faster browser than Internet Explorer. Firefox contains less vulnerabilities, reducing the risk of drive-by downloads.
  • Google Chrome is another good browser that is faster and more secure than Internet Explorer.

5. Read our other “Security Tips”

Tehnical details :

Code:
Associated files and registry values:

  File System
  ===============
    In the existing folder C:\Documents and Settings\All Users\Desktop
      . InfoKeeper.lnk"="11:27 15/05/11 738 bytes
      . C:\Documents and Settings\All Users\Start Menu\Programs\InfoKeeper
      . Ȩ������.lnk"="11:27 15/05/11 322 bytes
      . ����Ű��.lnk"="11:27 15/05/11 750 bytes
      . ����Ű�� ����.lnk"="11:27 15/05/11 738 bytes
      . ���̼���.lnk"="11:27 15/05/11 386 bytes
      .C:\Program Files\Ifkpr
      . IfkUn.exe"="13:51 26/04/10 13262848 bytes
      . ifkr2.baf"="10:18 02/09/09 22036 bytes
      . ifkr1.baf"="03:08 03/09/09 23688 bytes
      . Ifkmain.exe"="13:51 26/04/10 13262848 bytes
      . ifk.wax"="04:25 12/03/10 1 bytes
      . icon.ico"="08:21 30/10/09 17542 bytes
      . C:\Program Files\Ifkpr\log
      . 20110515.mpl"="11:30 15/05/11 98 bytes

  Registry
  ===============
    [HKEY_LOCAL_MACHINE\SOFTWARE\IKPReg]       "pid"="'qcckckokahcknckjkajkajccakajcch'"
      "signal"="'dkockoakockocknakorkojkookajckekoakon'"
      "hRes"="0"
      "auto"="1"
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]       "IPKRun"="'"C:\Program Files\Ifkpr\Ifkmain.exe" /ifk_fhrl'"
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IKPReg]       "UninstallString"="'C:\Program Files\Ifkpr\IfkUn.exe'"
      "DisplayName"="'InfoKeeper'"
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\International]       "W2KLpk"="1"

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.