Cyber Protect
A guide to uninstall Cyber Protect from your computer
This page contains detailed information on how to remove Cyber Protect for Windows. It is written by
Acronis. You can find out more on Acronis or check for application updates
here. More data about the software Cyber Protect can be seen at
https://www.acronis.com. The program is usually located in the C:\Program Files\BackupClient directory (same installation drive as Windows). The complete uninstall command line for Cyber Protect is MsiExec.exe /X{988C729F-5E07-4A52-8736-972CD96EDC8D}. The application's main executable file is labeled cyber-protect-service.exe and it has a size of 1.36 MB (1429240 bytes).
The executables below are part of Cyber Protect. They occupy an average of 312.65 MB (
327835944 bytes) on disk.
- asz_helper.exe (1.72 MB)
- mms.exe (17.24 MB)
- schedmgr.exe (902.17 KB)
- tibxread.exe (3.52 MB)
- msp_port_checker_packed.exe (5.83 MB)
- AcronisConnectAgent.exe (15.33 MB)
- cyber-protect-service.exe (1.36 MB)
- remediation.exe (1.66 MB)
- system_monitor_tool.exe (153.91 KB)
- DLPCL.exe (11.61 MB)
- DLPLogService.exe (11.95 MB)
- DLPNL.exe (7.55 MB)
- DLPService.exe (10.41 MB)
- dml_host.exe (3.54 MB)
- EdrCawl.exe (11.97 MB)
- EdrTest.exe (2.14 MB)
- permission_tool.exe (922.45 KB)
- python.exe (25.89 KB)
- acropsh.exe (600.16 KB)
- register_agent.exe (1.40 MB)
- acroinst2.exe (5.64 MB)
- acronis_web_installer.exe (16.59 MB)
- web_installer.exe (16.61 MB)
- MmsMonitor.exe (150.72 MB)
- acp-update-controller.exe (9.57 MB)
- product_info.exe (958.25 KB)
- migrate_credvault.exe (1.56 MB)
- upgrade_tool.exe (1.24 MB)
...click to view all...The current page applies to Cyber Protect version
24.3.37659 alone. You can find below info on other application versions of Cyber Protect:
...click to view all...
Cyber Protect has the habit of leaving behind some leftovers.
Directories found on disk:- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor
The files below are left behind on your disk when you remove Cyber Protect:- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Cache\Cache_Data\data_0
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Cache\Cache_Data\data_1
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Cache\Cache_Data\data_2
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Cache\Cache_Data\data_3
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Cache\Cache_Data\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Code Cache\js\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Code Cache\wasm\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\DawnCache\data_0
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\DawnCache\data_1
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\DawnCache\data_2
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\DawnCache\data_3
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\DawnCache\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\FontLookupTableCache\font_unique_name_table.pb
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\GPUCache\data_0
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\GPUCache\data_1
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\GPUCache\data_2
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\GPUCache\data_3
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\GPUCache\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local State
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local Storage\leveldb\000005.ldb
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local Storage\leveldb\255119.log
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local Storage\leveldb\255121.ldb
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local Storage\leveldb\CURRENT
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local Storage\leveldb\LOCK
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local Storage\leveldb\LOG
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Local Storage\leveldb\MANIFEST-216916
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\lockfile
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Network\Cookies
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Network\Network Persistent State
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Network\NetworkDataMigrated
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Network\TransportSecurity
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Cache\Cache_Data\data_0
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Cache\Cache_Data\data_1
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Cache\Cache_Data\data_2
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Cache\Cache_Data\data_3
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Cache\Cache_Data\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Code Cache\js\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Code Cache\wasm\index
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Local Storage\leveldb\000003.log
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Local Storage\leveldb\CURRENT
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Local Storage\leveldb\LOCK
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Local Storage\leveldb\LOG
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Local Storage\leveldb\MANIFEST-000001
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Network\Cookies
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Network\Network Persistent State
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Network\NetworkDataMigrated
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Network\TransportSecurity
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Partitions\ntlm-auth\Preferences
- C:\Users\%user%\AppData\Roaming\Cyber Protect Monitor\Preferences
Frequently the following registry data will not be uninstalled:- HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F927C88970E525A4786379C29DE6CDD8
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\9EBDE6F5-EAE6-4326-A3A1-DEAA29F32D1D_UserNameAndRecovery
Open regedit.exe in order to delete the following registry values:- HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F927C88970E525A4786379C29DE6CDD8\ProductName
A way to erase Cyber Protect from your computer using Advanced Uninstaller PRO
Cyber Protect is a program released by Acronis. Sometimes, users decide to erase this program. This is hard because performing this manually requires some advanced knowledge regarding removing Windows applications by hand. One of the best EASY approach to erase Cyber Protect is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:
1. If you don't have Advanced Uninstaller PRO already installed on your Windows PC, add it. This is good because Advanced Uninstaller PRO is a very useful uninstaller and all around tool to take care of your Windows system.
DOWNLOAD NOW- go to Download Link
- download the setup by pressing the green DOWNLOAD NOW button
- set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take your time to get familiar with Advanced Uninstaller PRO's design and number of features available. Advanced Uninstaller PRO is a very good Windows tool.
3. Press the General Tools category
4. Activate the Uninstall Programs feature
5. All the applications existing on the PC will appear
6. Navigate the list of applications until you locate Cyber Protect or simply activate the Search feature and type in "Cyber Protect". If it exists on your system the Cyber Protect application will be found very quickly. When you click Cyber Protect in the list , the following data about the application is made available to you:
- Star rating (in the lower left corner). The star rating explains the opinion other users have about Cyber Protect, ranging from "Highly recommended" to "Very dangerous".
- Opinions by other users - Press the Read reviews button.
- Details about the application you want to remove, by pressing the Properties button.
For example you can see that for Cyber Protect:
- The web site of the application is: https://www.acronis.com
- The uninstall string is: MsiExec.exe /X{988C729F-5E07-4A52-8736-972CD96EDC8D}
7. Click the Uninstall button. A confirmation dialog will appear. accept the uninstall by clicking the Uninstall button. Advanced Uninstaller PRO will then remove Cyber Protect.
8. After uninstalling Cyber Protect, Advanced Uninstaller PRO will offer to run an additional cleanup. Press Next to go ahead with the cleanup. All the items of Cyber Protect which have been left behind will be detected and you will be asked if you want to delete them. By uninstalling Cyber Protect with Advanced Uninstaller PRO, you are assured that no Windows registry items, files or folders are left behind on your system.
Your Windows system will remain clean, speedy and ready to run without errors or problems.
Disclaimer
This page is not a piece of advice to remove Cyber Protect by Acronis from your PC, we are not saying that Cyber Protect by Acronis is not a good application for your computer. This text only contains detailed instructions on how to remove Cyber Protect in case you decide this is what you want to do. Here you can find registry and disk entries that other software left behind and Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' computers.
Last update on: 2024-04-12 11:57:35.117