Share via

How can I get rid of all the changes a hacker made?

Henry Files 0 Reputation points
2026-03-16T06:44:00.52+00:00

I was downloading Ubuntu image from its website and it was taking a while and when I came back to check it I noticed the mouse was moving on its own and it was going though my files and after disconnecting the Wi-Fi and running scans I know that there is still malicious code on my system and I would like help removing it. The biggest red flag was the my credentials were changed and all the event logs were very long and too fast to be human. I'm kinda an amateur and have been hacked before but I still haven't learn proper security measures. Please send help or Microsoft personnel please tell me how I can roll back my data or scrub my data

Windows for home | Windows 11 | Security and privacy
0 comments No comments

2 answers

Sort by: Most helpful
  1. Bulldog 1,135 Reputation points
    2026-03-16T13:06:54.71+00:00

    You will never be able to find everything that an attacker has done to your computer.

    The only way to be certain that the malware is gone is to erase your hard drive and reinstall your software.

    The type of erasure for this purpose is called a low-level format, which means that the hard drive is overwritten with 0's and 1's.

    In addition, be on the lookout for signs that your identity was stolen.

    0 comments No comments

  2. DaveM121 864K Reputation points Independent Advisor
    2026-03-16T07:33:20.02+00:00

    1

    You indicate all your credentials were changes, please provide full details on that, and a screenshot of the problem you are seeing.

    2

    Download the Microsoft Safety Scanner, then run a full scan with that, at the end of the scan is it indicated malware was found on your PC and if so, was it removed.

    https://learn.microsoft.com/en-us/defender-endpoint/safety-scanner-download

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.