~~
If you're still doing analysis, to understand where the hacker could have entered, I recommend that you don't just look at the programs you have installed and used.
Check what files you downloaded in the last 3 months.
Check links that you eventually received via email and that you accessed in the last 3 months.
And if for some reason you used some non-genuine program, that could have been a problem.
I remember that nowadays, it is easy and cheap to get original programs.
If you need help finding them, or if you want me to buy them for you, let me know. I would be delighted to be able to help.