0% found this document useful (0 votes)
405 views2 pages

Log Uninstall

The document contains a series of commands to uninstall and remove the ESRV_SVC_QUEENCREEK service and related files, registry entries, scheduled tasks, and firewall rules from a Windows system. It stops the service, uninstalls files, deletes registry entries under various keys, removes scheduled tasks, and deletes firewall rules associated with the Intel System Usage Report.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
405 views2 pages

Log Uninstall

The document contains a series of commands to uninstall and remove the ESRV_SVC_QUEENCREEK service and related files, registry entries, scheduled tasks, and firewall rules from a Windows system. It stops the service, uninstalls files, deletes registry entries under various keys, removes scheduled tasks, and deletes firewall rules associated with the Intel System Usage Report.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

U

COMMAND[1]=[C:\Windows\System32\sc.exe stop ESRV_SVC_QUEENCREEK]


COMMAND[1]=["C:\Program Files\Intel\SUR\QUEENCREEK\x64\esrv.exe" --stop --port
49351]
COMMAND[3]=["C:\Program Files\Intel\SUR\QUEENCREEK\x64\esrv_svc.exe" --uninstall]
COMMAND[4]=["C:\Program Files\Intel\SUR\QUEENCREEK\x64\esrv_svc.exe" --uninstall
--run_as_user_process]
COMMAND[5]=[C:\Windows\System32\reg.exe delete HKLM\SOFTWARE\Intel\SUR\ICIP_RUN /f]

COMMAND[6]=[C:\Windows\System32\schtasks.exe /delete /tn


USER_ESRV_SVC_QUEENCREEK /f]
COMMAND[7]=[del /f /q "C:\Program Files\Intel\SUR\QUEENCREEK\x64\task.xml"]
COMMAND[8]=[del /f /q "C:\Program Files\Intel\SUR\QUEENCREEK\x64\task.vbs"]
COMMAND[9]=[del /f /q "C:\Program Files\Intel\SUR\QUEENCREEK\x64\task.bat"]
COMMAND[10]=[C:\Windows\System32\reg.exe delete
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ESRV_SVC /f]
COMMAND[10]=['C:\Windows\System32\reg.exe QUERY "HKEY_USERS"']
COMMAND[11]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\.DEFAULT\Software\ESRV]
COMMAND[12]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-19\Software\ESRV]
COMMAND[13]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-20\Software\ESRV]
COMMAND[14]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-21-998792437-
1695420444-3492368601-1001\Software\ESRV]
COMMAND[15]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-21-998792437-
1695420444-3492368601-1001_Classes\Software\ESRV]
COMMAND[16]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-18\Software\ESRV]
COMMAND[16]=['C:\Windows\System32\reg.exe QUERY "HKEY_USERS"']
COMMAND[17]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\.DEFAULT\Software\ESRV]
COMMAND[18]=[C:\Windows\System32\reg.exe QUERY
HKEY_USERS\.DEFAULT\Software\ESRV\ids]
COMMAND[19]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-19\Software\ESRV]
COMMAND[20]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-
19\Software\ESRV\ids]
COMMAND[21]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-20\Software\ESRV]
COMMAND[22]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-
20\Software\ESRV\ids]
COMMAND[23]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-21-998792437-
1695420444-3492368601-1001\Software\ESRV]
COMMAND[24]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-21-998792437-
1695420444-3492368601-1001\Software\ESRV\ids]
COMMAND[25]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-21-998792437-
1695420444-3492368601-1001_Classes\Software\ESRV]
COMMAND[26]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-21-998792437-
1695420444-3492368601-1001_Classes\Software\ESRV\ids]
COMMAND[27]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-18\Software\ESRV]
COMMAND[28]=[C:\Windows\System32\reg.exe QUERY HKEY_USERS\S-1-5-
18\Software\ESRV\ids]
COMMAND[29]=[C:\Windows\System32\netsh.exe advfirewall firewall show rule
name="Intel(R) System Usage Report - (QUEENCREEK Public UDP-In)"]
COMMAND[30]=[C:\Windows\System32\netsh.exe advfirewall firewall delete rule
name="Intel(R) System Usage Report - (QUEENCREEK Public UDP-In)"]
COMMAND[31]=[C:\Windows\System32\netsh.exe advfirewall firewall show rule
name="Intel(R) System Usage Report - (QUEENCREEK Public TCP-In)"]
COMMAND[32]=[C:\Windows\System32\netsh.exe advfirewall firewall delete rule
name="Intel(R) System Usage Report - (QUEENCREEK Public TCP-In)"]
COMMAND[33]=[C:\Windows\System32\netsh.exe advfirewall firewall show rule
name="Intel(R) System Usage Report - (QUEENCREEK Private SSDP-In)"]
COMMAND[34]=[C:\Windows\System32\netsh.exe advfirewall firewall delete rule
name="Intel(R) System Usage Report - (QUEENCREEK Private SSDP-In)"]
COMMAND[35]=[C:\Windows\System32\netsh.exe advfirewall firewall show rule
name="Intel(R) System Usage Report - (QUEENCREEK Private TCP-In)"]
COMMAND[36]=[C:\Windows\System32\netsh.exe advfirewall firewall delete rule
name="Intel(R) System Usage Report - (QUEENCREEK Private TCP-In)"]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy