Remove Trojan.Annieco

Juan Pitman
Apr 12, 2016 · 2 min read

The chance of your computer getting infected by malware raises dramatically every time you use it. The rate rises if your computer is connected to the internet. Such is a world we live in. It is filled with people who use technology to get ahead at the expense of others. Most malware authors write and code malwares to reap monetary benefits. That is why we need to be always on full alert, use our common sense and utilize good and effective firewall and anti-malware software. We must also arm ourselves with the knowledge to discern which email attachments contain malware and to know which websites we need to stay away from.

Just this March 30, 2016, IT security researchers have discovered yet another Trojan Horse whose main purpose is to steal information from its compromised computers. They have named this new malware as Trojan.Annieco. It mainly affects computers using the Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP operating systems. This malware spreads through email attachments and torrent downloads.

Once it has infected a computer or server it will gather BIOS information, list of startup programs, recent documents, network/LAN information, device information, operating system information, and memory information. Once it has gathered all the information, it will then upload it to http://]cloudgoldbom.ddns.net/system/open.

There are two methods to remove Trojan.Annieco. You can either erase every bit of data on your hard drive and then install a fresh copy of your operating system or you can try to remove Trojan.Annieco by doing a full scan of your preferred antimalware or antivirus software.

To remove Trojan.Annieco using your antivirus software you need to follow these following steps. First you need to boot your system to “Safe Mode With Networking”. Once you are there, you need to delete all restore points inside “System Restore”. You need to do this because most malware hide within these restore points and would activate again after a full scan. Before you do a full scan, you need to download and run Rkill. This software terminates all background services that are related to malware. You can now run a full scan after executing Rkill. The full scan should complete after a few minutes, a restart should be done for the changes to take effect.

After a full scan is done, your PC should be like brand spanking new.

    Juan Pitman

    Written by

    I’m an computer engineering instructor and a blogger.