Trellix Endpoint Security Adaptive Threat Protection
A way to uninstall Trellix Endpoint Security Adaptive Threat Protection from your computer
You can find on this page details on how to uninstall Trellix Endpoint Security Adaptive Threat Protection for Windows. It is written by
Musarubra US LLC.. You can read more on Musarubra US LLC. or check for application updates
here. More data about the application Trellix Endpoint Security Adaptive Threat Protection can be seen at
https://kcm.trellix.com/corporate/index?page=content&id=KB82761. Usually the Trellix Endpoint Security Adaptive Threat Protection application is to be found in the C:\Program Files\McAfee\Endpoint Security folder, depending on the user's option during setup. The entire uninstall command line for Trellix Endpoint Security Adaptive Threat Protection is MsiExec.exe /X{377DA1C7-79DE-4102-8DB7-5C2296A3E960}. Trellix Endpoint Security Adaptive Threat Protection's primary file takes around 500.27 KB (512280 bytes) and is called atpconfigtool.exe.
The executable files below are installed together with Trellix Endpoint Security Adaptive Threat Protection. They occupy about 13.75 MB (
14413904 bytes) on disk.
- atpconfigtool.exe (500.27 KB)
- ATPErrMgr.exe (282.27 KB)
- mfeatp.exe (440.27 KB)
- setupATP.exe (853.56 KB)
- ESConfigTool.exe (159.27 KB)
- mfeesp.exe (352.77 KB)
- mfeProvisionModeUtility.exe (221.27 KB)
- PwdUninstall.exe (3.08 MB)
- CCUninst.exe (42.77 KB)
- setupCC.exe (979.27 KB)
- MfeUpgradeTool.exe (155.27 KB)
- amcfg.exe (348.41 KB)
- mfeensppl.exe (693.58 KB)
- mfetp.exe (304.40 KB)
- mcshield.exe (478.59 KB)
- mfeamcin.exe (4.16 MB)
- setupTP.exe (852.27 KB)
...click to view all...This web page is about Trellix Endpoint Security Adaptive Threat Protection version
10.7.0 alone.
If you are manually uninstalling Trellix Endpoint Security Adaptive Threat Protection we recommend you to verify if the following data is left behind on your PC.
Folders left behind when you uninstall Trellix Endpoint Security Adaptive Threat Protection:- C:\Program Files\McAfee\Endpoint Security
Files remaining:- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AacEventManager.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AmcEventManager.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AMCoreUtil.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-2-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-datetime-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-debug-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-errorhandling-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-2-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l2-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-handle-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-heap-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-interlocked-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-libraryloader-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-localization-l1-2-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-memory-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-namedpipe-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processenvironment-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-1.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-profile-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-rtlsupport-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-string-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-2-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-sysinfo-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-timezone-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-util-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-conio-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-convert-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-environment-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-filesystem-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-heap-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-locale-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-math-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-multibyte-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-private-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-process-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-runtime-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-stdio-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-string-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-time-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-utility-l1-1-0.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ARR.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xml
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xsd
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_hss_msgbus.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_ma.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP_SelfProtection.rul
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPAmsiGuard.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atpconfigtool.exe
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDefXlateMap.xml
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPErrMgr.exe
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\blframework.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\com.mcafee_Adaptive_Threat_Protection.swidtag
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\concrt140.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ctp.db
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DataUtils.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DeepRem.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\dscache.db
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0404\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0407\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0409\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040C\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040D\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0410\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0411\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0412\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0413\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0415\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0416\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0419\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\041D\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0804\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0C0A\strings.bin
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Loglib.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ma_msgbus_auth.sig
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Matching.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\McVariantExport.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp.exe
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp_profile.xml
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem32.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem64.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\msvcp140.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RemediationBO.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\1033.mst
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\McAfee_Adaptive_Threat_Protection_x64.msi
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\setupATP.exe
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RPModules.dat
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\rules.db
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ScanOrchestrator.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\script.db
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ucrtbase.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vccorlib140.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140_1.dll
- C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\x86\ATPAmsiGuard.dll
- C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\ap.bak.xml
Registry that is not removed:- HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7C1AD773ED972014D87BC522693A9E06
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{377DA1C7-79DE-4102-8DB7-5C2296A3E960}
Additional registry values that you should clean:- HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\PwdUninstall.exe.ApplicationCompany
- HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\PwdUninstall.exe.FriendlyAppName
- HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7C1AD773ED972014D87BC522693A9E06\ProductName
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\lang\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.UniversalCRT\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.VC140.CRT\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.VC80.CRT\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\RepairCache\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Firewall\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Threat Prevention\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\WINDOWS\Installer\{377DA1C7-79DE-4102-8DB7-5C2296A3E960}\
A way to delete Trellix Endpoint Security Adaptive Threat Protection from your PC using Advanced Uninstaller PRO
Trellix Endpoint Security Adaptive Threat Protection is an application by the software company Musarubra US LLC.. Sometimes, users try to erase it. Sometimes this is easier said than done because deleting this by hand requires some advanced knowledge regarding Windows program uninstallation. The best SIMPLE action to erase Trellix Endpoint Security Adaptive Threat Protection is to use Advanced Uninstaller PRO. Take the following steps on how to do this:
1. If you don't have Advanced Uninstaller PRO on your Windows PC, add it. This is a good step because Advanced Uninstaller PRO is the best uninstaller and general tool to maximize the performance of your Windows PC.
DOWNLOAD NOW- go to Download Link
- download the setup by clicking on the DOWNLOAD NOW button
- install Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take your time to admire Advanced Uninstaller PRO's design and wealth of tools available. Advanced Uninstaller PRO is a very good Windows tool.
3. Press the General Tools category

4. Press the Uninstall Programs feature

5. A list of the programs existing on your PC will be made available to you
6. Navigate the list of programs until you locate Trellix Endpoint Security Adaptive Threat Protection or simply activate the Search feature and type in "Trellix Endpoint Security Adaptive Threat Protection". The Trellix Endpoint Security Adaptive Threat Protection application will be found very quickly. Notice that after you click Trellix Endpoint Security Adaptive Threat Protection in the list of applications, some information regarding the program is made available to you:
- Star rating (in the lower left corner). This tells you the opinion other people have regarding Trellix Endpoint Security Adaptive Threat Protection, ranging from "Highly recommended" to "Very dangerous".
- Reviews by other people - Press the Read reviews button.
- Details regarding the application you wish to uninstall, by clicking on the Properties button.
For instance you can see that for Trellix Endpoint Security Adaptive Threat Protection:
- The publisher is: https://kcm.trellix.com/corporate/index?page=content&id=KB82761
- The uninstall string is: MsiExec.exe /X{377DA1C7-79DE-4102-8DB7-5C2296A3E960}
7. Click the Uninstall button. A confirmation dialog will come up. accept the uninstall by clicking Uninstall. Advanced Uninstaller PRO will automatically remove Trellix Endpoint Security Adaptive Threat Protection.

8. After removing Trellix Endpoint Security Adaptive Threat Protection, Advanced Uninstaller PRO will offer to run a cleanup. Press Next to perform the cleanup. All the items of Trellix Endpoint Security Adaptive Threat Protection that have been left behind will be found and you will be able to delete them. By removing Trellix Endpoint Security Adaptive Threat Protection with Advanced Uninstaller PRO, you can be sure that no Windows registry items, files or directories are left behind on your system.
Your Windows computer will remain clean, speedy and able to run without errors or problems.
Disclaimer
This page is not a recommendation to uninstall Trellix Endpoint Security Adaptive Threat Protection by Musarubra US LLC. from your computer, nor are we saying that Trellix Endpoint Security Adaptive Threat Protection by Musarubra US LLC. is not a good application for your PC. This text only contains detailed info on how to uninstall Trellix Endpoint Security Adaptive Threat Protection supposing you decide this is what you want to do. The information above contains registry and disk entries that other software left behind and Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.
Last update on: 2022-12-11 16:09:48.590