Assuming you are not fighting a false positive due to something you've installed that might be legit but lesser known...
Do you have a restore point from before when malware was present? Backup image from before infection?
Some malware (for years now) had been essentially diskless/fileless....; hops from registry to RAM, deletes registry entries, can't be readily found in any scan, recreates itself in registry with new random name/location/start point prior to shutdown... Professional researchers often find it typically with carefully sought evidence of it's reaching out on the network to call home, beginning it's nefarious activities, etc..
Tools like Process Explorer, Autoruns, and LastActivityView might help...; one could easily spend near countless hours investigating it's new names, places of spawn/origin, etc... and it's sometimes quite fun,.... the first few hours....
You can investigate it forever if a security researcher, and/or forever curious as to the inner workings and complexity of malware design, and not really needing the infected system back in any time sensitive fashion...
If you need it back soon, however...
One things is more certain, you could flatten your existing install (classic 'nuke and pave'/delete partitions effectively deletes everything), and fresh install (quick format is automatic to a blanked disk install) from USB installer to SSD within as few as 5 minutes... (Alas, reinstalling drivers and your software will take longer, hence the great idea of having a good 'golden image' backup for when everything is fresh/perfect)