@anderTP conficker was already programed to attack the bios, if the bios was unreachable it would go for the mbr instead. It was designed to attack the legacy bios then updated to attack the phoenix bios as well. It infects the bios but doesnt destroy the computer, instead it sets up a nice rootkit on the bios. Whoever made it had advanced knowledge of the windows os 95-win8. Did their research on the how and where to inject into the bios without causing the bios to get corrupted. The rootkit loads up before any os, as its on the bios and loads with such. You cant reformat and get rid of it, because its not on the os its on the bios. Any reformatting will appear to have worked, accept the rootkit modifies each new windows install. Setting up sql server, remote assistance, remote user login, and deleting all the important files, and deregistering updates, and anti-virus software at will. On internet login (wifi) it tries attacking other machines on the network, it calls out on udp with all the system info, to the attackers server. Then the attacker can look over the system info, and login remotely with your credentials as a system process. This thing just keeps getting better and better. I had my laptop hit with the newest version, which was in a crimekit, obvious by the way it infected me and the different worms that were downloaded as soon as the cve-2013 exploit got me. This is a proof of concept, that has made me rethink about what is possible. It took 4 different computer specialists, the last 1 was a NT/IT and Software Developer. C. Frantz of michigan(smart guy). Anyway he hooked up my pc to his pc and ran some tests, and found the bios was updated recently and their was a rootkit installed on the bios chip. He tried removing the rootkit but couldnt. So he got me a new bios chip. Anyways everything works great again now that the new bios chip is in. No over clocked hard drives, no list of impersonation logs in event viewer, no anti-virus leaking registry keys, computer is back to normal.