Orphan Detection
Orphaned entries are applications that appear in the uninstaller list but have missing or invalid uninstallers.Identifying Orphans
Enable orphan detection:- Go to Settings > Advanced
- Enable Display orphaned entries
- Orphaned applications appear highlighted in purple
- The list legend shows “Orphaned” category
Why Applications Become Orphaned
Common causes:- Manual deletion of application files without proper uninstall
- Corrupted or incomplete uninstallation
- Moved or renamed installation directory
- Broken uninstaller executable
- Registry-only entries without actual files
Handling Orphaned Applications
For Invalid Entries:- Select the orphaned application
- Choose Advanced Operations > Delete Registry Entry
- Confirm removal
- Registry entry is safely removed
- Select the orphaned application
- Use Advanced Operations > Manual Uninstall
- BCU scans for any remaining files/registry entries
- Review and remove found junk
Startup Management
Manage applications that run automatically at system startup.Viewing Startup Entries
Applications with startup entries show indicators:- Applications with active startup items are marked
- View in Properties window under “Startup Entries” section
- Shows executable path, type (Run key, Task, Service), and status
Disabling Autostart
Prevent applications from starting automatically:- Select application(s) with startup entries
- Choose Advanced Operations > Disable Autostart
- Confirm the operation
- Startup entries are disabled (not deleted)
- Registry Run keys - HKLM and HKCU Run keys
- Startup folders - All Users and user-specific
- Scheduled tasks - Windows Task Scheduler entries
- Services - Windows services set to automatic start
Disabling autostart doesn’t uninstall the application - it only prevents automatic startup.
Certificate Validation
Verify digital signatures and publisher authenticity.Enabling Certificate Testing
- Go to Settings > Advanced
- Enable Test certificates
- BCU validates digital signatures for all executables
- Results appear as color coding in the list
Certificate Status Indicators
- Green - Valid, trusted certificate from recognized CA
- Orange - No certificate or self-signed
- Red - Invalid, expired, or revoked certificate
Understanding Certificate Results
Click an application and view Properties to see:- Certificate issuer
- Certificate subject (publisher)
- Valid from/to dates
- Certificate chain
- Validation errors (if any)
Certificate Caching
Speed up certificate validation:- Go to Settings > Advanced
- Enable Cache certificates
- Certificate results are saved to disk
- Subsequent scans are much faster
- Cache is automatically refreshed periodically
Invalid Entry Detection
Find broken or problematic uninstaller entries.Enabling Invalid Entry Testing
- Go to Settings > Advanced
- Enable Test for invalid entries
- BCU checks each entry for:
- Missing uninstaller executable
- Invalid paths
- Broken registry links
- Corrupted data
Working with Invalid Entries
Invalid entries appear with:- Red highlighting in the list
- “Invalid” indicator in status
- Cannot be uninstalled normally
- Delete Registry Entry - Remove from uninstaller list
- Manual Uninstall - Scan for any remaining junk
- Rename - Fix the display name if needed
Registry Operations
Advanced registry manipulation tools.Open Registry Key
View an application’s registry entry:- Select a single application
- Choose Advanced Operations > Open Registry Key
- Regedit opens with the key selected
- View and edit registry values
- Verifying application information
- Manually fixing broken entries
- Understanding application structure
- Troubleshooting issues
Delete Registry Entry
Remove uninstaller registry keys:- Select application(s) to remove
- Choose Advanced Operations > Delete Registry Entry
- Confirm the deletion
- Registry key is removed
- Uninstall the application
- Remove application files
- Clean up leftover data
- Clean up invalid entries
- Remove duplicate listings
- Fix corrupted uninstaller entries
Create Registry Backup
Export registry keys to .reg file:- Select application(s) to backup
- Choose Advanced Operations > Create Backup or press Ctrl+B
- Choose save location
- Registry keys exported to .reg file
- Main uninstaller registry key
- All subkeys and values
- Timestamp in filename
MSI Advanced Operations
Specialized tools for Windows Installer (MSI) packages.Accessing MSI Tools
- Select a single MSI-based application
- Choose Advanced Operations > MSI Uninstall
- Select operation mode
MSI Operation Modes
Uninstall:- Standard MSI uninstall with UI
- Shows progress and options
- Allows customization
- Command:
msiexec /x {GUID}
- Silent MSI removal
- No UI or prompts
- Uses default options
- Command:
msiexec /x {GUID} /qn
- Opens MSI modify/repair interface
- Allows feature selection
- Can repair or change installation
- Command:
msiexec /i {GUID}
MSI operations require the application’s Product GUID. BCU automatically extracts this from the registry.
Uninstall from Directory
Attempt to uninstall based on installation folder.When to Use
Useful for:- Portable applications
- Manually installed software
- Damaged or missing registry entries
- Leftover folders after uninstall
Process
Select Folder
- Choose Tools > Uninstall from Directory
- Browse to the application’s installation folder
- Select the folder containing the application
Detection
BCU attempts to:
- Find an uninstaller in the folder
- Match folder to known installed applications
- Create a temporary uninstaller entry
Uninstall
If an uninstaller is found:
- BCU prompts to run it
- Standard uninstall proceeds
- Proceeds to junk scan
- Scans for registry entries
- Offers to delete folder
Directory Ownership
Take ownership of protected folders for removal.When Needed
Some applications install to protected locations:- System folders with restricted permissions
- Directories owned by TrustedInstaller
- Folders locked by Windows security
Taking Ownership
- Select application(s)
- Choose Advanced Operations > Take Ownership
- Select target directory from submenu
- A command prompt opens
- Ownership is transferred
- Permissions are granted
Export and Import
Share and synchronize uninstaller lists.Export Applications
Save application list to XML:- Select applications to export
- Choose File > Export Selected
- Choose filename and location
- XML file contains:
- Application names, publishers, versions
- GUIDs and registry keys
- Install locations
- Uninstall commands
Export Uses
Documentation:- Create inventory of installed software
- Track installed versions
- Audit compliance
- Generate batch uninstall scripts
- Create deployment packages
- Standardize installations
- Maintain same applications across multiple PCs
- Remove the same bloatware from multiple systems
- Audit differences between systems
Export Store Apps to PowerShell
For Microsoft Store applications:- Select Store apps
- Choose File > Export Store Apps to PowerShell Script
- Save .ps1 script file
- Script contains PowerShell commands to remove selected Store apps
- Run with administrative privileges
Online Search Integration
Quickly research applications online.Search Options
Right-click an application and choose from:- Search Online - Google search for application name
- Open Web Page - Visit application’s official website (if available)
- Search Publisher - Find other applications by same publisher
Using Search Effectively
Before uninstalling unknown applications:- Search online to identify it
- Check if it’s required by other software
- Verify it’s not a system component
- Read removal experiences from others
Protected Application Handling
Override protection for system components.Protection System
BCU marks certain applications as “Protected”:- Critical Windows components
- Drivers and system utilities
- Security software
- Firmware and BIOS tools
- Cannot be uninstalled by default
- Show warning indicators
- Skip during batch operations
Disabling Protection
- Go to Settings > Advanced
- Enable Disable protection of system components
- Confirmation warning appears
- Protection is bypassed for the session
- Protected applications can now be uninstalled
- Warning prompt appears listing affected applications
- Option to proceed or cancel
- Operation can be canceled at any time
Simulation Mode
Test operations without making changes.Enabling Simulation
- Go to Settings > Advanced
- Enable Simulate uninstallation
- All operations run in simulation mode
- No actual changes are made to the system
- Pretends to run uninstallers
- Simulates file deletion
- Fakes registry modifications
- Shows progress and results as normal
When to Use Simulation
- Testing bulk operations before executing
- Learning how BCU works
- Verifying what would be removed
- Creating documentation or tutorials
- Troubleshooting without risk
Simulation mode is primarily for debugging and testing. Don’t forget to disable it before actual uninstallation.
Advanced Clipboard Operations
Copy detailed application information. Right-click application(s) and choose Copy to Clipboard:Copy Options
Program Name:- Just the display name
- One per line
- Plain text
- All available details
- Formatted text with labels
- Includes publisher, version, size, paths, GUIDs
- Just the uninstall command
- Can be used in scripts
- One per line
- Registry key location
- Can be pasted into regedit
- One per line
- Product codes only
- Useful for MSI operations
- One per line
Advanced Clipboard Copy
For customized output:- Choose Copy to Clipboard > Advanced
- Select fields to include
- Choose delimiter (tab, comma, pipe)
- Choose format (plain text, CSV, XML)
- Copy to clipboard
Tips for Power Users
Combine with Task Scheduler
Export PowerShell scripts and schedule them to run automatically for maintenance.
Use Portable Version
Run BCU from USB drive to clean multiple PCs without installation.
Create Standard Lists
Maintain XML lists of bloatware to remove from new PC setups.
Integrate with Scripts
Use command-line switches and exported data for automated workflows.
Monitor Certificate Changes
Regular certificate checks can identify tampered or replaced executables.
Batch Registry Backups
Before major changes, export all uninstaller registry keys as a master backup.
