It is critical information. If you can identify it you know the attack vectors, so you know what precautions you need to prevent reinfection. Which means that this: Is the equivalent of taking a medicine without a diagnosis. Much better if you know what the malware is. It will probably work but it may be more than you need to do (if its not in firmware) and if it is in firmware it could be in the GPU firmware, or somewhere else. It could something that is infecting your router, or on a website you use regularly, or ...... These are rare, but so are BIOS or SSD firmware infections (bar the NSA one which has been widely distributed) - if fact I think SSDs probably have to be infected at the point of manufacture (which is what the NSA did). If you cannot find out what the malware is (which really is better) would suggest: 1. Use a Linux installer (what version does not matter) or a rescue USB to reformat the drives. Maybe Gparted Live ( https://gparted.org/livecd.php ) if you just want to wipe the drive, or GRML if you want to be able to scan as well (instructions on wiki are out of date, but should work). 2. Reflash the BIOS. How you do it depends on the hardware. Ideally do this without reinstalling Windows - you might be able to do it from Linux or FreeDOS. 3. Reinstall Windows. A baby Penguin dies every time you do this . There is lots of firmware on a modern PC, and multiple processors besides the advertised ones. Most PCs actually have a separate processor running a different OS for things like remote management. Which would make it malware itself. Linux machines are much less likely to get infected. Macs and Linux are very likely to be hit by the same malware that got your Windows machine. Run malware scanners on both machines.