Publishers

Trellix Endpoint Security Threat Prevention Trellix Endpoint Security Threat Prevention





A way to uninstall Trellix Endpoint Security Threat Prevention from your computer

Trellix Endpoint Security Threat Prevention is a computer program. This page holds details on how to uninstall it from your computer. It was created for Windows by Trellix. Go over here where you can get more info on Trellix. You can get more details on Trellix Endpoint Security Threat Prevention at . Trellix Endpoint Security Threat Prevention is frequently installed in the C:\Program Files\McAfee\Endpoint Security directory, regulated by the user's decision. MsiExec.exe /X{820D7600-089E-486B-860F-279B8119A893} is the full command line if you want to uninstall Trellix Endpoint Security Threat Prevention. atpconfigtool.exe is the programs's main file and it takes close to 503.23 KB (515304 bytes) on disk.

Trellix Endpoint Security Threat Prevention installs the following the executables on your PC, occupying about 13.69 MB (14359032 bytes) on disk.

  • atpconfigtool.exe (503.23 KB)
  • ATPErrMgr.exe (282.23 KB)
  • mfeatp.exe (443.73 KB)
  • setupATP.exe (878.98 KB)
  • ESConfigTool.exe (162.23 KB)
  • mfeesp.exe (356.73 KB)
  • mfeProvisionModeUtility.exe (225.23 KB)
  • PwdUninstall.exe (3.08 MB)
  • CCUninst.exe (42.73 KB)
  • setupCC.exe (1,023.73 KB)
  • MfeUpgradeTool.exe (158.73 KB)
  • amcfg.exe (339.88 KB)
  • mfeensppl.exe (688.88 KB)
  • mfetp.exe (295.88 KB)
  • mcshield.exe (485.69 KB)
  • mfeamcin.exe (4.01 MB)
  • setupTP.exe (877.73 KB)
...click to view all...

This data is about Trellix Endpoint Security Threat Prevention version 10.7.17.9246 alone. For more Trellix Endpoint Security Threat Prevention versions please click below:


Following the uninstall process, the application leaves some files behind on the PC. Some of these are listed below.

Folders found on disk after you uninstall Trellix Endpoint Security Threat Prevention from your PC:
  • C:\Program Files\McAfee\Endpoint Security

Usually, the following files are left on disk:
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AacEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AmcEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AMCoreUtil.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-datetime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-debug-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-errorhandling-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l2-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-handle-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-interlocked-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-libraryloader-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-localization-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-memory-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-namedpipe-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processenvironment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-profile-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-rtlsupport-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-sysinfo-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-timezone-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-util-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-conio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-convert-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-environment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-filesystem-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-locale-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-math-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-multibyte-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-private-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-process-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-runtime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-stdio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-time-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-utility-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ARR.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xsd
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_hss_msgbus.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_ma.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP_SelfProtection.rul
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPAmsiGuard.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atpconfigtool.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDefXlateMap.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDetectAmsiInitFail.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPErrMgr.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\blframework.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\com.mcafee_Adaptive_Threat_Protection.swidtag
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\concrt140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ctp.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DataUtils.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DeepRem.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\dscache.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0404\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0407\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0409\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040C\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0410\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0411\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0412\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0413\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0415\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0416\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0419\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\041D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0804\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0C0A\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Loglib.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ma_msgbus_auth.sig
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Matching.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\McVariantExport.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp_profile.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem32.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem64.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\msvcp140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RemediationBO.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\1033.mst
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\McAfee_Adaptive_Threat_Protection_x64.msi
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\setupATP.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RPModules.dat
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\rules.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ScanOrchestrator.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\script.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ucrtbase.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vccorlib140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140_1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\x86\ATPAmsiGuard.dll

Registry that is not uninstalled:
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|ATPDetectAmsiInitFail.dll
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|x86|ATPDetectAmsiInitFail.dll
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0067D028E980B68468F072B918918A39
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{820D7600-089E-486B-860F-279B8119A893}

Open regedit.exe in order to delete the following registry values:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0067D028E980B68468F072B918918A39\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\lang\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.UniversalCRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.VC140.CRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\RepairCache\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Firewall\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Threat Prevention\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{820D7600-089E-486B-860F-279B8119A893}\


How to remove Trellix Endpoint Security Threat Prevention with Advanced Uninstaller PRO

Trellix Endpoint Security Threat Prevention is an application released by Trellix. Frequently, people try to uninstall it. This is efortful because uninstalling this by hand takes some advanced knowledge related to removing Windows programs manually. The best QUICK way to uninstall Trellix Endpoint Security Threat Prevention is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:





1. If you don't have Advanced Uninstaller PRO already installed on your Windows system, install it. This is good because Advanced Uninstaller PRO is one of the best uninstaller and all around utility to maximize the performance of your Windows computer.

DOWNLOAD NOW

  • go to Download Link
  • download the setup by clicking on the DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take some time to admire the program's design and number of tools available. Advanced Uninstaller PRO is a powerful system optimizer.

3. Click on the General Tools category
Go to General Tools


4. Click on the Uninstall Programs button
Go to Uninstall Programs


5. A list of the applications installed on the PC will be shown to you

6. Navigate the list of applications until you locate Trellix Endpoint Security Threat Prevention or simply click the Search field and type in "Trellix Endpoint Security Threat Prevention". The Trellix Endpoint Security Threat Prevention program will be found very quickly. When you select Trellix Endpoint Security Threat Prevention in the list , some information about the program is shown to you:


  • Star rating (in the left lower corner). This tells you the opinion other users have about Trellix Endpoint Security Threat Prevention, ranging from "Highly recommended" to "Very dangerous".
  • Reviews by other users - Click on the Read reviews button.
  • Details about the application you want to uninstall, by clicking on the Properties button.
For instance you can see that for Trellix Endpoint Security Threat Prevention:





  • The software company is: https://kcm.trellix.com/corporate/index?page=content&id=KB82761
  • The uninstall string is: MsiExec.exe /X{820D7600-089E-486B-860F-279B8119A893}
7. Press the Uninstall button. A confirmation dialog will show up. accept the uninstall by clicking the Uninstall button. Advanced Uninstaller PRO will automatically uninstall Trellix Endpoint Security Threat Prevention.
Uninstall Trellix Endpoint Security Threat Prevention


8. After uninstalling Trellix Endpoint Security Threat Prevention, Advanced Uninstaller PRO will offer to run a cleanup. Press Next to start the cleanup. All the items that belong Trellix Endpoint Security Threat Prevention that have been left behind will be found and you will be asked if you want to delete them. By removing Trellix Endpoint Security Threat Prevention using Advanced Uninstaller PRO, you can be sure that no registry items, files or folders are left behind on your computer.

Your PC will remain clean, speedy and able to run without errors or problems.



Disclaimer

The text above is not a recommendation to uninstall Trellix Endpoint Security Threat Prevention by Trellix from your PC, we are not saying that Trellix Endpoint Security Threat Prevention by Trellix is not a good application. This page only contains detailed info on how to uninstall Trellix Endpoint Security Threat Prevention in case you decide this is what you want to do. Here you can find registry and disk entries that other software left behind and Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' PCs.

2025-03-14 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2025-03-14 06:00:33.360