Publishers

Trellix Endpoint Security Adaptive Threat Protection Trellix Endpoint Security Adaptive Threat Protection





A way to uninstall Trellix Endpoint Security Adaptive Threat Protection from your system

You can find below details on how to remove Trellix Endpoint Security Adaptive Threat Protection for Windows. It is developed by Trellix. More info about Trellix can be seen here. You can get more details related to Trellix Endpoint Security Adaptive Threat Protection at . The application is often placed in the C:\Program Files\McAfee\Endpoint Security folder. Keep in mind that this location can differ being determined by the user's choice. Trellix Endpoint Security Adaptive Threat Protection's complete uninstall command line is MsiExec.exe /X{377DA1C7-79DE-4102-8DB7-5C2296A3E960}. The application's main executable file is titled atpconfigtool.exe and occupies 503.23 KB (515304 bytes).

The executable files below are part of Trellix Endpoint Security Adaptive Threat Protection. They occupy an average of 13.69 MB (14359032 bytes) on disk.

  • atpconfigtool.exe (503.23 KB)
  • ATPErrMgr.exe (282.23 KB)
  • mfeatp.exe (443.73 KB)
  • setupATP.exe (878.98 KB)
  • ESConfigTool.exe (162.23 KB)
  • mfeesp.exe (356.73 KB)
  • mfeProvisionModeUtility.exe (225.23 KB)
  • PwdUninstall.exe (3.08 MB)
  • CCUninst.exe (42.73 KB)
  • setupCC.exe (1,023.73 KB)
  • MfeUpgradeTool.exe (158.73 KB)
  • amcfg.exe (339.88 KB)
  • mfeensppl.exe (688.88 KB)
  • mfetp.exe (295.88 KB)
  • mcshield.exe (485.69 KB)
  • mfeamcin.exe (4.01 MB)
  • setupTP.exe (877.73 KB)
...click to view all...

The current page applies to Trellix Endpoint Security Adaptive Threat Protection version 10.7.17.9149 only. You can find below a few links to other Trellix Endpoint Security Adaptive Threat Protection releases:


When you're planning to uninstall Trellix Endpoint Security Adaptive Threat Protection you should check if the following data is left behind on your PC.

You should delete the folders below after you uninstall Trellix Endpoint Security Adaptive Threat Protection:
  • C:\Program Files\McAfee\Endpoint Security

Usually, the following files are left on disk:
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AacEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AmcEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AMCoreUtil.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-datetime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-debug-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-errorhandling-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l2-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-handle-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-interlocked-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-libraryloader-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-localization-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-memory-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-namedpipe-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processenvironment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-profile-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-rtlsupport-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-sysinfo-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-timezone-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-util-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-conio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-convert-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-environment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-filesystem-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-locale-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-math-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-multibyte-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-private-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-process-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-runtime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-stdio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-time-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-utility-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ARR.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xsd
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_hss_msgbus.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_ma.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP_SelfProtection.rul
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPAmsiGuard.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atpconfigtool.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDefXlateMap.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDetectAmsiInitFail.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPErrMgr.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\blframework.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\com.mcafee_Adaptive_Threat_Protection.swidtag
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\concrt140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ctp.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DataUtils.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DeepRem.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\dscache.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0404\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0407\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0409\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040C\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0410\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0411\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0412\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0413\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0415\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0416\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0419\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\041D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0804\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0C0A\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Loglib.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ma_msgbus_auth.sig
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Matching.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\McVariantExport.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp_profile.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem32.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem64.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\msvcp140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RemediationBO.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\1033.mst
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\McAfee_Adaptive_Threat_Protection_x64.msi
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\setupATP.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RPModules.dat
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\rules.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ScanOrchestrator.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\script.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ucrtbase.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vccorlib140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140_1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\x86\ATPAmsiGuard.dll

Registry that is not uninstalled:
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|ATPDetectAmsiInitFail.dll
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|x86|ATPDetectAmsiInitFail.dll
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7C1AD773ED972014D87BC522693A9E06
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{377DA1C7-79DE-4102-8DB7-5C2296A3E960}

Open regedit.exe to delete the registry values below from the Windows Registry:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7C1AD773ED972014D87BC522693A9E06\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\lang\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.UniversalCRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.VC140.CRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\RepairCache\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Firewall\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Threat Prevention\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{377DA1C7-79DE-4102-8DB7-5C2296A3E960}\


How to remove Trellix Endpoint Security Adaptive Threat Protection from your computer with the help of Advanced Uninstaller PRO

Trellix Endpoint Security Adaptive Threat Protection is an application marketed by the software company Trellix. Some users want to uninstall it. This can be easier said than done because doing this manually requires some experience regarding removing Windows programs manually. The best QUICK action to uninstall Trellix Endpoint Security Adaptive Threat Protection is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO on your Windows PC, install it. This is good because Advanced Uninstaller PRO is one of the best uninstaller and general utility to maximize the performance of your Windows PC.

DOWNLOAD NOW

  • navigate to Download Link
  • download the setup by pressing the DOWNLOAD NOW button
  • set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take some time to get familiar with Advanced Uninstaller PRO's interface and number of features available. Advanced Uninstaller PRO is a very good PC management program.

3. Press the General Tools category
Go to General Tools


4. Activate the Uninstall Programs button
Go to Uninstall Programs


5. All the applications installed on your computer will be shown to you

6. Scroll the list of applications until you locate Trellix Endpoint Security Adaptive Threat Protection or simply activate the Search feature and type in "Trellix Endpoint Security Adaptive Threat Protection". The Trellix Endpoint Security Adaptive Threat Protection application will be found automatically. Notice that after you select Trellix Endpoint Security Adaptive Threat Protection in the list of programs, the following data about the program is made available to you:


  • Star rating (in the lower left corner). The star rating tells you the opinion other users have about Trellix Endpoint Security Adaptive Threat Protection, from "Highly recommended" to "Very dangerous".
  • Opinions by other users - Press the Read reviews button.
  • Details about the program you wish to remove, by pressing the Properties button.
For example you can see that for Trellix Endpoint Security Adaptive Threat Protection:





  • The web site of the application is: https://kcm.trellix.com/corporate/index?page=content&id=KB82761
  • The uninstall string is: MsiExec.exe /X{377DA1C7-79DE-4102-8DB7-5C2296A3E960}
7. Click the Uninstall button. A confirmation window will show up. Confirm the removal by clicking Uninstall. Advanced Uninstaller PRO will automatically uninstall Trellix Endpoint Security Adaptive Threat Protection.
Uninstall Trellix Endpoint Security Adaptive Threat Protection


8. After removing Trellix Endpoint Security Adaptive Threat Protection, Advanced Uninstaller PRO will offer to run an additional cleanup. Click Next to perform the cleanup. All the items of Trellix Endpoint Security Adaptive Threat Protection which have been left behind will be found and you will be able to delete them. By removing Trellix Endpoint Security Adaptive Threat Protection using Advanced Uninstaller PRO, you are assured that no registry items, files or directories are left behind on your disk.

Your system will remain clean, speedy and able to take on new tasks.



Disclaimer

This page is not a recommendation to remove Trellix Endpoint Security Adaptive Threat Protection by Trellix from your PC, nor are we saying that Trellix Endpoint Security Adaptive Threat Protection by Trellix is not a good application for your computer. This text simply contains detailed info on how to remove Trellix Endpoint Security Adaptive Threat Protection in case you want to. The information above contains registry and disk entries that our application Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' PCs.

2025-03-14 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2025-03-14 05:59:05.797