Power Spy is a commercial computer monitoring program that logs all user keystrokes, takes screenshots, tracks user activity, captures online chat conversations and records web sites visited. Gathered data is sent to a configurable e-mail address. Power Spy is able to hide itself from the user. The program is usually installed manually. It runs on every Windows startup.
Power Spy properties
• Takes and sends out screenshots of user activity
• Sends out logs by FTP or email
• Logs keystrokes
• Hides from the user
• Stays resident in background
Automatic Power Spy removal:
It might be that we are affiliated with any of our recommended products. Full disclosure can be found in
our Agreement of Use.
We are testing STOPzilla's efficiency at removing Power Spy
We are testing SpyHunter's efficiency at removing Power Spy
Malwarebytes Anti Malware
We are testing Malwarebytes Anti Malware's efficiency at removing Power Spy
We are testing XoftSpySE Anti Spyware's efficiency at removing Power Spy
Virus Removal Phone Support
Power Spy manual removal
pcjb.exe, regsvcdll.exe, windll32.exe
Delete registry values:
pcjb.exe, regsvcdll.exe, windll32.exe, psuser.ini
C:\Program Files\Power SpyMisc:
Exact file location:
pcjb.exe - C:\Program Files\Power Spy
regsvcdll.exe, windll32.exe, psuser.ini - C:\Windows\System, C:\Windows\System32 or C:\Winnt\System32
Geolocation of Power Spy
This map reveals the prevalence
of Power Spy. Countries and regions that have been affected the most
are: United Kingdom, Australia, India, United States and Canada.
QR code for Power Spy removal instructions
QR is short for Quick Response. They can be read quickly by the mobile phones. QR codes can store more data than
standard barcodes, including url links, geo coordinates, and text.
The reason we add QR code to the
website is that parasites like Power Spy are really hard to remove on infected computer.
you can quicly scan the QR code with your mobile device and have manual removal instructions to
uninstall Power Spy right in your pocket.
Simply use the QR scanner and read removal instructions from mobile device.
Information added: 2006-02-05 02:36
Information updated: 2006-02-05 02:36
Attention: If you know know a reputable website reated to security threats, please add a link here: add url