https://www.martau.com/uninstaller-download.php Download Total Uninstall uninstaller
Uninstall software from the following operating systems with native support.
Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista, Windows XP (64-bit, 32-bit)
Download Release history
Version 6.23.0 (2018-05-11)
New areas for cleaner
[Ultimate] Support for detection of altered items from system (comparing "after" with "current" column) and a new view "Deep Audit"
Fix for inaccessible (access denied) registry items reported as missing in "current" column view.
Using the RegEdit display format in changes tree. :
https://www.martau.com/document/total-uninstall.php Total Uninstall - powerful installation monitor and advanced uninstaller.
Total Uninstall is a complete uninstaller which includes two working modes.
Installed Programs module analyze existing installations and create a log with installation changes. It can uninstall programs even without the help of the supplied Add Remove program.
Just select from the list the program that you want to uninstall and in a few seconds Total Uninstall will analyze it and will show in a tree view detected files, folders, registry keys and values of that program. You can review the details and remove some of the detected items. Total Uninstall is ready to uninstall the analyzed program. It will use first the supplied Add Remove program and will continue removing remaining items using the log.
Monitored Programs module helps to monitor any changes made to your system during the installation of a new program. It allows you to perform a complete uninstall without having to rely on the supplied built-in uninstaller, which can leave files or changes behind.
Total Uninstall creates a snapshot of your system prior to installing a new program. It then takes an additional snapshot after the installation has completed. It then compares the two snapshots and displays all changes in a graphical tree view, marking all registry values and/or files that have been added, changed or deleted. Total Uninstall saves these changes and, if you decide to uninstall the program, it will reverse the changes to the previous state.
Features
Accurate analyze existing installations and create a log with installation changes.
Monitor changes from registry and file system for new installations.
Uninstall completely and thoroughly analyzed or monitored programs.
Create a backup for a program and restore the program from backup.
Organize in groups installed or monitored programs.
Find the program to uninstall by keyword quickly and easily.
Summary and detailed information for each installed or monitored program.
User configurable views of the detected changes.
It shows a detailed uninstall log.
Powerful search in detected changes.
Standalone program agent for notification of running installation programs.
Export registry changes for install or uninstall.
Export installed or monitored programs list to a file.
Export to file or print detected changes.
Transfer programs from one computer to another
2005-2018 Gavrila Martau. : BitDefender Log File
Product : Bitdefender Total Security
Scanning task : Contextual Scan
Log date : Friday, May 11, 2018 4:19:14 PM
Scan Paths:
Path : C:\Users\mrtro\Desktop\Total-Uninstall-Setup-6.23.0.exe
[-]Detailed Scan Summary
[-]Basic
Scanned items : 536
Infected items : 0 (no infected items have been detected)
Suspicious items : 0 (no suspected items have been detected)
Resolved items : 0 (no threats have been detected during this scan)
Unresolved items : 0 (no issues remained unresolved)
[+]Advanced
[-]Scan Options
[-]Target Threat Types:
Scan for viruses : Yes
Scan for adware : Yes
Scan for spyware : Yes
Scan for applications : Yes
Scan for dialers : Yes
Scan for rootkits : No
Scan for keyloggers : Yes
[-]Target Selection Options:
Scan registry keys : No
Scan cookies : No
Scan boot sectors : No
Scan memory processes : No
Scan archives : Yes
Scan runtime packers : Yes
Scan emails : Yes
Scan all files : Yes
Heuristic Scan : Yes
Scanned extensions : none configured
Excluded extensions : none configured
[-]Target Processing:
Default primary action for infected objects : None
Default secondary action for infected objects : None
Default primary action for suspicious objects : None
Default secondary action for suspicious objects : None
Default action for hidden objects : None
Default action for password-protected objects : Prompt for password