Well, here's the deal. You haven't removed MacKeeper. I somehow doubt that it's causing your original problem, but on the other hand, I don't see anything else that's more likely to be causing it, and as long as any part of MacKeeper is installed, your system is unmaintainable.
We've exhausted my knowledge of the subject of removing MacKeeper. I gave you a procedure that worked in my tests, and has worked for everyone else I suggested it to. It's not working for you, perhaps because you have an older, more malware-like version.
So you have two choices: do your own research on MacKeeper removal, or do what I would do in your place -- a clean reinstallation of the system. If you choose the latter, proceed as follows.
Back up all data to at least two different storage devices, if you haven't already done so. The backups can be made with Time Machine or with a mirroring tool such as Carbon Copy Cloner. Preferably both.
Boot into Recovery (command-R at startup), launch Disk Utility, and erase the startup volume with the default options.This operation will destroy all data on the volume, so you had be better be sure of your backups. Quit Disk Utility and install OS X. When you reboot, you'll be prompted to go through the initial setup process. That’s when you transfer the data from one of your backups. For details of how this works, see here:
Using Setup Assistant
Transfer only "Users" and "Settings" – not "Applications" or "Other files." Don't transfer the Guest account, if it was enabled on the old system.
Reinstall your third-party software cautiously. Self-contained applications that install into the Applications folder by drag-and-drop or download from the App Store are safe. Anything that comes packaged as an installer or that prompts for an administrator password is suspect, and you must test thoroughly after reinstalling each such item to make sure you haven't restored the problem.
Note: You need an always-on Ethernet or Wi-Fi connection to the Internet to use Recovery. It won’t work with USB or PPPoE modems, or with proxy servers, or with networks that require a certificate for authentication.