Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.



13 February 2007
Shareware Version
Risk Impact:
File Names:
ik97v12s.exe dat2txt.exe ik.exe ik.dll
Systems Affected:


Spyware.InvisibleKey is a program that logs keystrokes.


Your Symantec program detects this threat as Spyware.InvisibleKey.


Spyware.InvisibleKey must be manually installed.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 07 May 2019 revision 006
  • Initial Daily Certified version 15 July 2004
  • Latest Daily Certified version 07 May 2019 revision 008
  • Initial Weekly Certified release date 21 July 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Spyware.InvisibleKey has the following functionality: Keystroke logging

When Spyware.InvisibleKey is installed, the following actions are performed:
  1. Displays the End User License Agreement (EULA).

  2. Creates the following files/directories:
    • %ProgramFiles%\ik\UNWISE.EXE: A generic uninstaller.
    • %ProgramFiles%\ik\Order.txt: Ordering information.
    • %ProgramFiles%\ik\License.txt: License information.
    • %ProgramFiles%\ik\dat2txt.exe: A log converter.
    • %ProgramFiles%\ik\readme.txt: Documentation.
    • %ProgramFiles%\ik\ik.exe: The main logging module.
    • %System%\ik.dll: ik.exe uses this file.
    • %ProgramFiles%\ik\INSTALL.LOG: Installation information.
    • %ProgramFiles%\ik\ik.dat: A log file.
    • %ProgramFiles%\ik\ik.txt: A log file.

    • %System% is a variable. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
    • %ProgramFiles% is a variable that refers to the path to the program files folder. By default, this is C:\Program Files.

  3. Adds the following value:

    "ik" = "C:\PROGRA~1\ik\IK.EXE"

    to the registry key:


    so that the spyware runs when you start Windows.

  4. Adds the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\IK 97 Shareware Version

  5. Modifies the following values:

    "C:\WINNT\system32\msvcirt.dll" = "0x<previous value + 1>"
    "C:\WINNT\system32\msvcrt.dll" = "0x<previous value + 1>"
    "C:\WINNT\system32\mfc42.dll" = "0x<previous value + 1>"

    in the registry key:


    : The numeric values indicate the number of programs using the shared DLLs located in the file paths listed in the left-hand side.

The following instructions pertain to all Symantec antivirus products that support Security Risk detection.
  1. Update the definitions.
  2. Uninstall Spyware.InvisibleKey.
  3. Restart the computer in Safe mode.
  4. Run a full system scan and delete all the files detected as Spyware.InvisibleKey.
  5. Delete the values that were added to the registry.
For specific details on each of these steps, read the following instructions.

1. To update the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. To uninstall the Spyware
  1. Navigate to %ProgramFiles%\ik.
  2. Double-click UNWISE.EXE.

3. To restart the computer in Safe mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode. For instructions, read the document, "How to start the computer in Safe Mode . "

4. To scan for and delete the files
  1. Start Norton AntiVirus and make sure that it is configured to scan all the files. For more information, read the document, "How to configure Norton AntiVirus to scan all files."
  2. Run a full system scan.
  3. If any files are detected as Spyware.InvisibleKey, click Delete.

    Note: If your Symantec antivirus product reports that it cannot delete a detected file, write down the path and file names. Then use Windows Explorer to locate and delete the file.
5. To delete the value from the registry

Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.

This is done to make sure that all the keys are removed. They may not be there if the uninstaller removed them.
  1. Click Start > Run.
  2. Type regedit, then click OK.
  3. Navigate to the key:


  4. In the left plane, delete the value:

    "ik" = "C:\PROGRA~1\ik\IK.EXE"

  5. Navigate to the key:


  6. In the left plane, delete the subkey:

    IK 97 Shareware Version

  7. Exit the Registry Editor.