This guide is for educational purposes and personal recovery only.
This method manipulates Windows system files (System32). Unethical use of this method to access computers without permission is illegal. The author assumes no liability for data loss or misuse.
This documentation outlines a method to reset a forgotten Local Administrator password on Windows 10 or 11 without losing personal data. It utilizes the Windows Recovery Environment (WinRE) to temporarily replace the "Ease of Access" (Utility Manager) tool with the Command Prompt to gain System-level privileges at the lock screen.
- Physical access to the target PC / Laptop.
- A Local Windows Account (This may not work for online Microsoft Accounts linked to cloud authentication).
- No BitLocker encryption (or possession of the BitLocker recovery key).
- Turn on the PC and wait for the Login/Lock screen.
- Press and hold the
SHIFTkey on your keyboard. - While holding
SHIFT, click the Power Button icon on the screen and select Restart. - Keep holding
SHIFTuntil the "Choose an option" blue screen appears. - Navigate to: Troubleshoot > Advanced options > Command Prompt.
Once the Command Prompt window opens, execute the following commands in order.
Note: The system drive is usually
C:, but in recovery mode, it might be mounted asD:. IfC:is empty, tryD:.
- Select the System Drive:
C:
- Navigate to System32:
cd windows/system32 - Backup the original Utility Manager:
ren utilman.exe utilman1.exe - Replace Utility Manager with CMD:
ren cmd.exe utilman.exe - Reboot:
Click "Continue" to boot into Windows.
exit
- Once back at the Lock Screen, click the Accessibility/Ease of Access icon (bottom right, looks like a person/clock).
- A Command Prompt window should open (instead of the usual menu).
- Open the User Accounts panel by typing:
control userpasswords2
- In the window that appears:
- Select the locked User Account.
- Click Reset Password.
- Enter a new password (or leave blank to remove it).
- Click OK.
- Close the Command Prompt and log in with the new credentials.
Highly Recommended: After recovering access, you should restore the original files to maintain system security and functionality.
- Repeat Phase 1 to get back to the Recovery Command Prompt.
- Run these commands to reverse the changes:
C: cd windows/system32 ren utilman.exe cmd.exe ren utilman1.exe utilman.exe exit
The Utility Manager (utilman.exe) is designed to run on the lock screen to assist users with disabilities (e.g., On-screen keyboard, Narrator). Because it runs before a user logs in, it requires System privileges.
By swapping utilman.exe with cmd.exe (Command Prompt), we trick the operating system into launching the terminal with those same System privileges. This bypasses the need for user authentication, allowing administrative commands (like changing passwords) to be executed freely.