Publishers

Application McAfee Endpoint Security Threat Intelligence





A guide to uninstall McAfee Endpoint Security Threat Intelligence from your system

This info is about McAfee Endpoint Security Threat Intelligence for Windows. Here you can find details on how to uninstall it from your computer. It was created for Windows by McAfee, Inc.. Go over here where you can read more on McAfee, Inc.. Please open if you want to read more on McAfee Endpoint Security Threat Intelligence on McAfee, Inc.'s page. McAfee Endpoint Security Threat Intelligence is normally installed in the C:\Program Files\McAfee\Endpoint Security directory, however this location may differ a lot depending on the user's decision while installing the program. The full uninstall command line for McAfee Endpoint Security Threat Intelligence is MsiExec.exe /X{78634193-63B6-4B88-B24A-619E47F8E213}. McAfee Endpoint Security Threat Intelligence's primary file takes around 135.14 KB (138384 bytes) and is called ESConfigTool.exe.

The following executables are installed beside McAfee Endpoint Security Threat Intelligence. They take about 9.72 MB (10191432 bytes) on disk.

  • ESConfigTool.exe (135.14 KB)
  • mfeesp.exe (436.90 KB)
  • mfeProvisionModeUtility.exe (383.62 KB)
  • PwdUninstall.exe (3.07 MB)
  • CCUninst.exe (39.10 KB)
  • setupCC.exe (491.83 KB)
  • MfeUpgradeTool.exe (138.66 KB)
  • mfetie.exe (425.33 KB)
  • TieErrMgr.exe (15.33 KB)
  • setupTIE.exe (429.33 KB)
  • amcfg.exe (93.41 KB)
  • mfetp.exe (447.47 KB)
  • mfeamcin.exe (1.12 MB)
  • mcshield.exe (1.01 MB)
  • setupTP.exe (441.33 KB)
...click to view all...

The information on this page is only about version 10.2.0 of McAfee Endpoint Security Threat Intelligence. For more McAfee Endpoint Security Threat Intelligence versions please click below:


Some files and registry entries are frequently left behind when you remove McAfee Endpoint Security Threat Intelligence.

Folders remaining:
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence

Files remaining:
  • C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\modules\tie\bomodels\threat_intelligence_model.js
  • C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\modules\tie\sections\tie_threat_intelligence_view.js
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\blframework.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\blframeworkrt.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\blframeworku.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\EpSecApiLib.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\jcmcontent.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\JcmRts.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0404\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0407\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0409\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\040C\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\040D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0410\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0411\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0412\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0413\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0415\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0416\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0419\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\041D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0804\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\lang\0C0A\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\LogLib.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\McVariantExport.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\mfetie.exe
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\mfetie_profile.xml
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\RepairCache\McAfee_Threat_Intelligence_x86.msi
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\RepairCache\setupTIE.exe
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\reputation.xml
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\reputation.xsd
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\reputation_bo.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\TIE.xml
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\TIE.xsd
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\tie_aac_hooks.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\tie_bo.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\tie_hss_lpc.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\tie_ma.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\TIECommunicator.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\TieErrMgr.exe
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\TieInterfaceDll.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\TIEProfiler.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\tieScanCache.tmp
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\TIEVe.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\ts.dll
  • C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\xml.xsd
  • C:\Windows\Installer\{78634193-63B6-4B88-B24A-619E47F8E213}\ARPPRODUCTICON.exe

Registry keys:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\391436876B3688B42BA416E9748F2E31
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{78634193-63B6-4B88-B24A-619E47F8E213}

Use regedit.exe to remove the following additional registry values from the Windows Registry:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\391436876B3688B42BA416E9748F2E31\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Threat Intelligence\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{78634193-63B6-4B88-B24A-619E47F8E213}\


A way to remove McAfee Endpoint Security Threat Intelligence from your PC with Advanced Uninstaller PRO

McAfee Endpoint Security Threat Intelligence is a program by the software company McAfee, Inc.. Frequently, people want to erase this application. This is troublesome because deleting this by hand requires some skill regarding removing Windows programs manually. One of the best SIMPLE manner to erase McAfee Endpoint Security Threat Intelligence is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO already installed on your Windows PC, install it. This is good because Advanced Uninstaller PRO is a very useful uninstaller and general utility to optimize your Windows system.

DOWNLOAD NOW

  • go to Download Link
  • download the program by pressing the DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. Take some time to admire Advanced Uninstaller PRO's design and wealth of functions available. Advanced Uninstaller PRO is a very good program.

3. Click on the General Tools button
Go to General Tools


4. Press the Uninstall Programs tool
Go to Uninstall Programs


5. All the applications existing on your computer will appear

6. Scroll the list of applications until you locate McAfee Endpoint Security Threat Intelligence or simply click the Search feature and type in "McAfee Endpoint Security Threat Intelligence". The McAfee Endpoint Security Threat Intelligence app will be found automatically. Notice that when you select McAfee Endpoint Security Threat Intelligence in the list of programs, the following information about the application is available to you:


  • Star rating (in the left lower corner). The star rating explains the opinion other users have about McAfee Endpoint Security Threat Intelligence, ranging from "Highly recommended" to "Very dangerous".
  • Opinions by other users - Click on the Read reviews button.
  • Technical information about the app you want to uninstall, by pressing the Properties button.
For example you can see that for McAfee Endpoint Security Threat Intelligence:





  • The web site of the program is: http://www.mcafeesecurity.com/
  • The uninstall string is: MsiExec.exe /X{78634193-63B6-4B88-B24A-619E47F8E213}
7. Click the Uninstall button. A confirmation page will come up. Confirm the removal by clicking the Uninstall button. Advanced Uninstaller PRO will then uninstall McAfee Endpoint Security Threat Intelligence.
Uninstall McAfee Endpoint Security Threat Intelligence


8. After removing McAfee Endpoint Security Threat Intelligence, Advanced Uninstaller PRO will ask you to run a cleanup. Press Next to perform the cleanup. All the items of McAfee Endpoint Security Threat Intelligence that have been left behind will be detected and you will be asked if you want to delete them. By removing McAfee Endpoint Security Threat Intelligence with Advanced Uninstaller PRO, you can be sure that no registry items, files or folders are left behind on your computer.

Your computer will remain clean, speedy and ready to run without errors or problems.



Disclaimer

The text above is not a recommendation to remove McAfee Endpoint Security Threat Intelligence by McAfee, Inc. from your computer, nor are we saying that McAfee Endpoint Security Threat Intelligence by McAfee, Inc. is not a good application. This page simply contains detailed info on how to remove McAfee Endpoint Security Threat Intelligence supposing you decide this is what you want to do. The information above contains registry and disk entries that other software left behind and Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' PCs.

2016-10-05 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2016-10-05 10:51:06.513