Malware cleanup is one of those moments when you want absolute certainty. If you click Reset this PC → Remove everything, will a virus still survive? The short answer is technically yes—but only in a few rare scenarios. The long answer is where you get peace of mind: with the right reset choices (and a couple of extra steps), you can make persistence extremely unlikely. And when you want a guarantee, a clean, partition-level reinstall seals the deal.
In this deep-dive, we’ll explain the how and the why. We’ll walk through the exact clicks for Reset this PC (including which options matter), then show a from-scratch install that obliterates hidden partitions, rootkits that rely on them, and most other persistence tricks. We’ll also cover the rare—but real—case of firmware (UEFI/BIOS) malware, and what you can do about it.

Take a breath—we’ll go step by step. If something looks risky, I’ll say so. If there’s a safer alternative, I’ll point to it. And if you want to skip ahead, use the table of contents below.
1. 🧠 What Can Survive a Standard Reset? (Rootkits, Partitions, Firmware)
Before we make changes, it helps to understand the few places malware could theoretically hide even after you click Remove everything.
Let’s set expectations first: these are uncommon. Most malware is removed by a proper reset. But for completeness—and your peace of mind—here are the edge cases:
- Rootkits
Rootkits manipulate the operating system at a low level to hide themselves. If the reset process simply moves or overwrites Windows but leaves certain low-level structures intact (or restores from a compromised local image), a rootkit could re-infect the fresh install. - Hidden/Reserved Partitions (including Recovery)
Windows often keeps hidden partitions—for boot, recovery, and vendor tools. If your reset uses the local recovery image, and that image is compromised, a new Windows installation could be born infected. - Firmware (UEFI/BIOS)
This is the code that runs before Windows and initializes hardware. It’s outside the Windows disk entirely. A standard reset doesn’t touch it. Firmware malware is very rare but notoriously persistent.
So, yes—technically malware can survive. Practically? With the right steps, you can make that vanishingly unlikely.
Quick transition: Now that we know the “how,” let’s separate normal cases from edge cases so you choose the right level of response.
2. 🧭 When “Reset this PC” Is Enough—and When It’s Not
Think of this as a spectrum:
- Likely enough (most home users, typical adware/PUAs/commodity malware):
Use Reset this PC with Remove everything + Cloud download + Clean data. This is fast, convenient, and effective in the vast majority of scenarios. - Need stronger assurance (you suspect tricky persistence, compromised recovery image, or multiple drives that might carry malware):
Still use Reset this PC, but make sure you:- pick Cloud download,
- Clean data, and
- Delete files from all drives (if any secondary drives might be contaminated).
- Maximum certainty (you want guarantees, you administer shared or sensitive machines, or your reset options seem limited/suspicious):
Perform a clean, from-scratch install from external media and delete every partition during setup. This is the “nothing survives” approach for disk-resident threats. - Very rare, very advanced suspicion (UEFI/BIOS compromise):
Consider a firmware update/flash following the vendor’s official procedure. We’ll cover this carefully later because firmware steps are powerful and should be done by the book.
So far so good? Great—let’s start with the safer way to use Reset this PC so you get the most out of that feature.
3. 🛠️ Safer “Reset this PC”: The Exact Options You Should Choose
We’ll go slowly here so we don’t miss a choice that improves your odds. The wording can be confusing, so I’ll explain what each option actually does and why you should (or shouldn’t) use it.
3.1 Open the Reset Wizard
- Right-click Start → Settings → type “reset” in the search box → choose Reset this PC.
You’ll see two big paths:
- Keep my files (not recommended for malware cleanup)
- Remove everything (recommended)
Why “Remove everything”?
If even one personal file is infected, “keep my files” carries the risk of re-introducing the malware. For a cleanup, we want a clean slate.
3.2 Choose Cloud download (not Local reinstall)
- If prompted, select Cloud download.
Why Cloud download?
It fetches a fresh, known-good copy of Windows from Microsoft’s servers. Local reinstall may use a hidden recovery partition on your disk; if that image is compromised, your fresh Windows won’t be clean. Cloud avoids that risk.
Official reference:
- Reset this PC (Microsoft Support): https://support.microsoft.com/windows (search “Reset this PC”)
- Windows 11 download (Media/Cloud): https://www.microsoft.com/software-download/windows11
- Windows 10 download: https://www.microsoft.com/software-download/windows10
3.3 Open Change settings and enable Clean data
- In the summary screen, click Change settings.
- Turn Clean data → On.
What “Clean data” does:
It performs a more thorough wipe of the Windows drive, making it significantly harder for anything to persist or be recovered. It takes longer (sometimes hours), but for malware cases, it’s worth it.
3.4 If you have multiple drives: Delete files from all drives
- Toggle Delete files from all drives → On (only if you believe other internal drives might hold infected content or scripts that could re-trigger trouble).
When to use this:
If your PC has extra internal drives or you’ve previously run programs off another volume, it’s safer to wipe them now than to get re-infected later.
Important: Back up any known-good data externally first.
3.5 Confirm and proceed
- Review the summary:
- Remove everything
- Cloud download
- Clean data = On
- Delete files from all drives = On (if needed)
- Click Next → Reset and allow the process to finish.
What this doesn’t touch:
Your firmware (UEFI/BIOS) lives on the motherboard, not the disk. We’ll talk about that separately.
Let’s pause for a moment. If you choose the options above, Reset this PC is more than enough for the vast majority of infections. If you still want absolute certainty—or your PC doesn’t offer Cloud/clean options—the clean install below is your best friend.
4. 💣 The Nuclear Option: Reinstall Windows from Scratch (Full Walkthrough)
This is the method that guarantees nothing on the disk survives—not hidden partitions, not rootkits that rely on them, not compromised local recovery images. It’s simple in principle: you boot from trusted external media, delete every partition, and let Windows create new ones on a blank disk.
We’ll go step by step. Before starting:
- Back up personal data to an external drive you trust.
- Have your Microsoft account info handy (for sign-in after install).
- If your PC uses BitLocker, make sure you have the recovery key.
4.1 Create install media on another clean machine (recommended)
- Windows 11 Media Creation Tool:
https://www.microsoft.com/software-download/windows11 - Windows 10 Media Creation Tool:
https://www.microsoft.com/software-download/windows10
Use the tool to create a bootable USB installer (8 GB or larger). If you already have a known-good ISO, you can write it using Rufus (https://rufus.ie/) or the tool’s built-in writer.
4.2 Boot from the USB
- Insert the USB into the target PC.
- Power on and immediately press your boot menu key (often F12, F9, Esc, F8, F11—varies by vendor).
- Choose the USB device to boot.
4.3 Start installation and select Windows edition
- Select Language, Time, Keyboard → Install now.
- If asked for a product key, choose I don’t have a product key (Windows usually auto-activates later on the same hardware).
- Pick the edition that matches your license (e.g., Windows 11 Pro).
4.4 Accept license → Choose Custom: Install Windows only (advanced)
This is the critical fork. We’re not upgrading; we’re replacing.
4.5 Delete every partition on the target drive
You’ll see a list of all partitions on the internal disk: EFI System, Microsoft Reserved, Recovery, Primary, etc. One by one:
- Select a partition → click Delete → confirm.
- Repeat until the drive shows Unallocated space only.
Why we delete all partitions:
This erases any hidden/reserved areas and guarantees nothing remains from the old install. If malware lived in a recovery image or reserved area, it’s gone now.
Careful: If you have multiple internal disks, verify you’re deleting partitions on the correct disk. If unsure, disconnect other drives temporarily.
4.6 Click Next on the unallocated space
Windows will automatically create new partitions (EFI, MSR, Primary, Recovery) and begin installing.
4.7 Complete out-of-box setup (OOBE)
- Choose region, keyboard, network.
- Sign in with your Microsoft account (optional but recommended for sync/recovery).
- Skip adding apps you don’t need.
- Let Windows reach the desktop.
Congratulations—this is as clean as it gets for disk-resident threats.
5. 🧬 Rare but Real: Firmware (UEFI/BIOS) Malware & What You Can Do
Let’s be crystal clear: firmware infections are extremely rare in the consumer world. Most “I’m sure it’s in my BIOS!” cases turn out to be misconfigurations, driver conflicts, bad updates, or persistent apps on a secondary drive.
That said, if you want to go the extra mile:
5.1 Identify your motherboard/PC model
- Device Manager → Firmware/System
- Or check System Information (
msinfo32) for BaseBoard Product and BIOS Version/Date.
5.2 Download the official UEFI/BIOS update
- PC OEM support page (Dell, HP, Lenovo, ASUS, Acer, etc.)
- Motherboard vendor (MSI, Gigabyte, ASRock, ASUS, etc.)
Only use official vendor tools/files. Never flash firmware from untrusted sources.
5.3 Flash/update firmware—even to the same version
Vendors often allow re-flashing the current version, which can overwrite firmware code regions. Follow the exact instructions on your vendor’s site. Many provide Windows utilities or UEFI-based flash tools (EZ Flash, M-Flash, Q-Flash, etc.).
Vendor starting points (landing pages):
- Dell Support: https://www.dell.com/support/home
- HP Support: https://support.hp.com
- Lenovo Support: https://support.lenovo.com
- ASUS Download Center: https://www.asus.com/support/
- Acer Support: https://www.acer.com/support/
- MSI Support: https://www.msi.com/support
- Gigabyte Support: https://www.gigabyte.com/Support
- ASRock Support: https://www.asrock.com/support/
Caution: A failed or incorrect firmware flash can brick your system. Ensure stable power, correct file, and follow steps precisely.
5.4 Consider other device firmware
Highly advanced threats could theoretically target SSD firmware, network adapters, or discrete hardware. Practically speaking, this is exceedingly uncommon. If you administer high-risk environments, consult vendor docs for storage and NIC firmware tools. For typical home and small-office scenarios, a clean OS + patched firmware + good hygiene is both realistic and sufficient.
6. 🧰 Post-Install Checklist: Verify, Patch, and Harden
We’ve rebuilt the house—now we lock the doors and test the alarm. This section prevents déjà vu.
6.1 Update Windows fully
- Settings → Windows Update → Check for updates until none remain.
- Install optional driver updates only if needed (prefer vendor drivers when possible).
6.2 Update essential drivers from official sources
- GPU (NVIDIA/AMD/Intel)
- Chipset, storage, audio (PC or motherboard vendor)
Official links:
- NVIDIA: https://www.nvidia.com/Download/index.aspx
- AMD: https://www.amd.com/en/support
- Intel: https://www.intel.com/content/www/us/en/download-center/home.html
6.3 Scan with Microsoft Defender Offline (fresh baseline)
Defender Offline scans before Windows fully loads—useful if you’re extra cautious.
- Guide: https://support.microsoft.com/windows (search “Microsoft Defender Offline”)
- Settings → Privacy & security → Windows Security → Virus & threat protection → Scan options → Microsoft Defender Offline scan
6.4 Restore personal data selectively
- Copy back only what you need, ideally after scanning.
- Avoid restoring old startup apps or unknown installers.
6.5 Re-install apps from known-good sources
- Prefer official vendor websites or trusted stores.
- Avoid “driver updater” utilities and bundled installers.
6.6 Enable protection features
- SmartScreen: Settings → Privacy & security → Windows Security → App & browser control → ON
- Core isolation / Memory integrity (if compatible): Windows Security → Device security
- BitLocker (Pro editions): Control Panel → BitLocker Drive Encryption
6.7 Create a clean System Image / Restore Point
- After you’re satisfied, capture a snapshot so you never have to start from zero again.
7. 🧪 Evidence-Based Confidence: Troubleshooting False Alarms
It’s common to feel infected even when you’re not—especially after reading about firmware threats. Here’s how to keep your footing:
- Reproducibility matters: If a symptom doesn’t reproduce after a clean install, it likely wasn’t firmware.
- Event Viewer ≠ malware: Many warnings are normal. Focus on new events that correlate with real symptoms.
- Network oddities: DNS misconfigurations, flaky routers, or ISP hiccups often look like “hacking.” Reset your router, update firmware, and use DNS-over-HTTPS if available.
- Performance dips: Check Task Manager → Startup and uninstall bloat before assuming infection.
If, after a from-scratch install and firmware update, you still see the identical behavior, it’s time for professional diagnostics (disk health, RAM tests, PSU stability, driver incompatibilities).
8. ❓ FAQs
Q1: Can malware survive “Reset this PC → Remove everything”?
Technically yes, in edge cases (compromised recovery image, rootkits relying on hidden partitions, or firmware). Practically no, if you choose Cloud download, Clean data, and (when appropriate) Delete files from all drives. For certainty, do a from-scratch install and delete all partitions.
Q2: What’s the safest choice within “Reset this PC”?
- Remove everything
- Cloud download
- Clean data = On
- Delete files from all drives = On (if multiple internal disks)
Q3: When should I skip Reset and go straight to a clean install?
If your reset doesn’t offer Cloud, you suspect recovery partition tampering, or you simply want zero doubt—go straight to the from-scratch method.
Q4: How likely is firmware (UEFI/BIOS) malware?
Extremely rare in consumer scenarios. Most “it must be the BIOS” cases have more mundane causes. If you’re still worried after a clean install, perform an official firmware re-flash.
Q5: Do I need special anti-rootkit tools?
Not usually. A from-scratch install with full partition deletion eliminates disk-resident rootkits. If you’re investigating, using Microsoft Defender Offline is a good first step.
Q6: What if I have multiple internal drives?
Malware can live or re-trigger from any internal volume. Either wipe all internal drives during reset, or physically disconnect secondary drives while doing the clean install, then reconnect and reformat as needed.
Q7: After reinstall, what should I install first?
Windows updates, chipset/storage/GPU drivers from official sources, then your daily apps. Avoid questionable download portals.
9. ✅ Final Thoughts & Practical Recommendations
Let’s put this in simple decision steps:
- Start with Reset this PC if you want fast and effective cleanup:
- Remove everything → Cloud download → Clean data = On → All drives (if needed).
This resolves the vast majority of infections.
- Remove everything → Cloud download → Clean data = On → All drives (if needed).
- Use a clean, from-scratch install for maximum certainty:
- Boot from official USB media → Custom install → Delete every partition → install to Unallocated space.
This neutralizes hidden partitions and most persistence strategies.
- Boot from official USB media → Custom install → Delete every partition → install to Unallocated space.
- Only consider firmware after you’ve done #2 and still see identical behavior:
- Use the official vendor procedure to update/re-flash UEFI/BIOS.
- Harden and verify after you’re clean:
- Update Windows and drivers, run Defender Offline, restore data selectively, enable SmartScreen, consider BitLocker, and keep a clean image/restore point.
Most importantly—don’t panic. Possibility is not probability. With the steps above, you’re stacking the odds decisively in your favor.
⚠️ Disclaimer
Performing system resets, repartitioning, firmware updates, and clean installs can cause data loss if you skip backups or select the wrong drive. Always back up critical data to a trusted external location before proceeding. Follow vendor instructions carefully—especially for UEFI/BIOS updates—to avoid device damage. This article is educational; apply changes at your own risk based on your environment.
Tags
Windows reset malware, Reset this PC remove everything, Cloud download Windows, Clean install Windows, Delete all partitions Windows setup, Rootkit persistence, UEFI BIOS malware, Microsoft Defender Offline, Windows 11 reinstall, Windows 10 reinstall, Recovery partition risk, Post install hardening
Hashtags
#Windows11 #Windows10 #Malware #CyberSecurity #ResetThisPC #CleanInstall #UEFI #BIOS #MicrosoftDefender #PCMaintenance