Remove Trojan.Win32.LogonInvader.a

Threat Summary

Threat: Trojan.Win32.LogonInvader.a
Type: Trojan
Brief Description: This type of Trojan can open a backdoor on the infected computer giving attacker a remote access.

Description

Trojan.Win32.LogonInvader.a is detection for Trojan that performs certain malicious actions once installed on the computer. The Trojan belongs to a big group that has so many variants who can serve risky purposes, hence, they are utilized to download and execute other threats originating from a remote server. To single out this particular Trojan, Ikarus Anti-virus named it as Trojan.Win32.LogonInvader.a.

When Trojan.Win32.LogonInvader.a is executed on the computer, this threat can complete a payload depending on the code within it. Normal procedure of this Trojan is to open a firewall on the affected system so that remote attack may gain an access. Then, it connects to a distant server to download and execute other codes, most of the time it runs malware files.

Effects of Trojan.Win32.LogonInvader.a on the computer vary. Still, it depends on the type of attack and code inclusions on the Trojan. One thing is for sure, Trojan.Win32.LogonInvader.a impact on the PC may be damaging. It affects not only system files but also the performance of Windows. If fatally infected, Trojan.Win32.LogonInvader.a will cause system crashes or total disability of the operating system.

Remove Trojan.Win32.LogonInvader.a instantly using anti-virus program. Make sure that its database is up-to-date. Additionally, running other security tools such as anti-malware may help find and remove other modules, which evades anti-virus detection.

What are the Symptoms of Trojan.Win32.LogonInvader.a Infection?

It will modify Windows Registry and add the following entries:

  • [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore]
  • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{F689FD98-DD67-4D13-9259-6644329F9041}]
  • [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer]
  • [HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Run]
  • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run]
  • [HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System]

The threat will drop the following malicious file/files:

  • %System%\winfiles.exe
  • %Windir%\winfiles.exe
  • %Windir%\GessM.exe
  • %ProgramFiles%\server.exe

Procedures to Remove Trojan.Win32.LogonInvader.a

Removal steps on this page will help you get rid of the threat effectively using tools and virus scanners. Please make sure that you will carry out the guide in exact order.

Procedure 1: Scan Computer in Safe Mode Using Installed Anti-virus Program

Start Windows 8 / Windows 10 in Safe Mode with Networking

- Close all running programs on your computer because we will need to restart Windows on this procedure.
- Press and Hold Shift key on your keyboard while clicking on Restart.
- You will then be presented with Troubleshooting Options.
- Click on Troubleshoot icon.
- Then, Click on Advanced Options icon.
- Select Startup Settings icon and then, Click on Restart button.
- When Windows restarts, it will prompt to choose number from the list of options. Press the number on your keyboard that corresponds to Safe Mode with Networking, commonly number 5.
- Once in Safe Mode, please proceed to the next step which is running a virus scan on the computer.

Start in Safe Mode with Networking (Windows XP / Vista / 7 Instruction)

- Please restart the computer and just before Windows start, press F8 on your keyboard repeatedly. You will be presented with Advanced Options Menu.
- From the selections, choose Safe Mode with Networking. Please use keyboard's arrow up/down to navigate between selections and press Enter to proceed.

win7-safemode

2. Open your installed anti-virus programs and update it to the most recent version by automatically downloading necessary updates.

3. Thoroughly scan the computer and remove all identified threats. Do not restart or turn off the computer after the scan process. You still need to run another scan. Please follow the next procedure.

Procedure 2: Scan and remove Trojan.Win32.LogonInvader.a files with MalwareBytes Anti-Malware

To remove Trojan.Win32.LogonInvader.a, download Malwarebytes Anti-Malware. This tool is effective in getting rid of Trojans, viruses and malware.

Download Removal Tool

1. After downloading, please install the program using the default settings.

2. At the end of the installation, please make sure that it will download necessary updates.

3. Once update has completed, MBAM will launch.

MBAM Scanner

4. Select SCAN from the top menu. Then, click on Threat Scan (Recommended) section.

5. Click on Start Scan to thoroughly scan the computer. Remove all threats detected by this anti-malware program after the process.

Procedure 3: Run Microsoft Safety Scanner to remove Trojan.Win32.LogonInvader.a components.

MS Safety Scanner is a free security tool that offers on-demand virus scanning and helps remove threats from the infected computer. It is a stand-alone program that works even with existing antivirus program.

Important: Each download of Microsoft Safety Scanner expires 10 days after the acquisition date. If this period lapses, you need to download the same program from the same location again. New download contains newer virus definition and database to detect and clean most recent viruses.

To use this tool in removing Trojan.Win32.LogonInvader.a, please follow this procedure.

1. Download Microsoft Safety Scanner from official web site. Click on the button below.

Download Safety Scanner

2. Save the file to a convenient location such as Desktop.

3. Once the download completes, browse the folder and double-click on the file msert.exe. Icon for this file looks like this.

MS Safety Scanner Icon

4. If Windows prompts for a security warning and ask if you want to run the file, click on Run. For Windows Vista/7 users, you may right-click on the file and select Run as administrator from the selection.

Run as administrator

5. On initial run, the tool will display End User License Agreement, please accept the terms and click Next. Continue on the process until you reach the Scan Type window.

6. Select on Full scan to entire the system and detect any presence of Trojan.Win32.LogonInvader.a. Then, click Next button to begin the scan process. Scanning may take a while, please be patient.

Full Scan

7. Once Microsoft Safety Scanner finished on scanning the computer, it will display the result. If it finds presence of Trojan.Win32.LogonInvader.a and other malware, the tool removes them automatically.

8. Click on Finish button to close the tool.

Procedure 4: Run Another Scan Using Symantec's ZeroAccess Fix Tool

This tool from Symantec can remove infections of Trojan.Win32.LogonInvader.a as well as other variants of the same nature.

1. Click on the button below to download ZeroAccess Fix Tool. Save the file FixZeroAccess.exe to your desktop or any convenient location.

Download FixZeroAccess

2. You need to close any running programs before running this tool.

3. Optionally, you can turn OFF System Restore if you are using Windows XP. Trojan.Win32.LogonInvader.a files may hide some of its components on system restore files.

4. Next, browse the folder where you saved the file FixZeroAccess.exe. Double-click on it to initiate the tool. To run the file in Windows Vista and Windows 7, right-click on it and choose 'Run as administrator' from the selection.

Icon of ZeroAccessFix

Run As Administrator

5. It will display End User License Agreement (EULA), please click on I accept to use the program.

6.Click on Proceed to begin the removal process, let the tool to run and do its course.

7. If it requires you to restart Windows, please do so. This method may remove Trojan.Win32.LogonInvader.a components such as files and hidden modules.

Restart Windows

8. When Windows starts, ZeroAccess Fix Tool will provide some details of the infection.

9. If it prompts for update, you need to run LiveUpdate to make sure that it contains the most recent virus definitions.

10. Wait for the tool to complete the scan process. When done, it will issue a message and specify identified threats. These threats are removed during the scan process, so, there is no need to worry about their presence.

Procedure 5: Make sure that Trojan.Win32.LogonInvader.a is 100% deleted with Avast aswMBR

A Trojan often drops malware using an advance technology known as rootkit. It hides the installation of Trojan.Win32.LogonInvader.a from your anti-virus program and injects malicious code to running Windows processes. To complete the clean-up process, you also need to scan and remove rootkit Trojan.

1. Download aswMBR from Avast server. Save it to your computer.

Download aswMBR

2. Double-click on the file aswMBR.exe to run the program.

3. If it prompts you to download the latest Avast! virus definition, please click Yes. This is necessary to identify most recent version of the Trojan as well as hidden files of Trojan.Win32.LogonInvader.a.

Updating aswMBR

4. Click on Scan button to start checking your computer for presence of rootkit Trojan and other viruses. It will display a message "Scan finished successfully" when done.

aswMBR Scan

5. Click Fix or FixMBR to start removing infection. If aswMBR contains the latest Avast! virus definition file, it will automatically clean infected files on your PC.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>