Batch uninstall: Removing several low-risk apps in one session saves time; still reboot between groups if the installer stack misbehaves.
Cloud sync clients: Uninstall may leave shell extensions until reboot; check Explorer context menus after cleanup.
.NET runtimes: Multiple versions often coexist; uninstall only when no apps reference them.
Email suites: Profiles in AppData may remain for backup reasons. Export mail before deleting folders.
Fonts & plugins: Creative suites scatter assets across ProgramData; scan paths before manual deletion.
Game launchers: Libraries point to large folders; uninstall launcher only after moving or deleting game content intentionally.
Hyper-V / WSL: Virtual switches and optional features interact; use component uninstall in order.
Printer drivers: Class drivers may be shared; removing one vendor’s stack can still leave a generic driver behind.
Java stacks: IDEs and servers may pin specific JDK paths. Coordinate with dev teams before cleanup.
Keyboard utilities: Low-level hooks may need reboot to release input capture.
LDAP / VPN: Corporate profiles may repush software. Coordinate with IT before repeated removals.
Audio plugins: VST paths span multiple disks; DAW-specific uninstall may be required.
Network filters: Firewall and filter drivers unload last. Follow vendor order.
OCR bundles: Language packs add bulk; remove unused languages first.
Package managers: When present, they track different metadata than classic installers, so avoid duplicate installs.
VM hosts: Virtual adapters remain until the hypervisor uninstall completes and reboots.
Remote tools: Services may restart automatically until startup entries are cleared.
Scanners: TWAIN/WIA drivers sometimes persist per user. Check all profiles on shared PCs.
Terminal environments: Shell profiles and keys in user folders are separate from the app uninstaller.
USB / serial tools: Driver INF packages may need Device Manager cleanup after app removal.
Video codecs: Shared decoders affect many players. Test playback after removing a suite.
Windows Sandbox: Ephemeral by design; unrelated to host uninstall hygiene but useful for testing risky removals.
XML / JSON configs: Apps may regenerate defaults on next launch. Delete configs only when sure.
Smart cards: PKCS#11 middleware stacks interact with browser and VPN. Uninstall in documented order.
Archiver shell extensions: Explorer may cache DLLs until restart after uninstall.
This supplement is informational; behavior varies by Windows build and third-party installers. Cross-check critical steps on your own hardware and policies.