By | March 13, 2010 | 0 Comment

Trojan.Win32.LogonInvader.a is detection for Trojan that performs certain malicious actions once installed on the computer. The Trojan belongs to a big group that has so many variants who can serve risky purposes, hence, they are utilized to download and execute other threats originating from a remote server. To single out this particular Trojan, Ikarus Anti-virus named it as Trojan.Win32.LogonInvader.a.

When Trojan.Win32.LogonInvader.a is executed on the computer, this threat can complete a payload depending on the code within it. Normal procedure of this Trojan is to open a firewall on the affected system so that remote attack may gain an access. Then, it connects to a distant server to download and execute other codes, most of the time it runs malware files.

Effects of Trojan.Win32.LogonInvader.a on the computer vary. Still, it depends on the type of attack and code inclusions on the Trojan. One thing is for sure, Trojan.Win32.LogonInvader.a impact on the PC may be damaging. It affects not only system files but also the performance of Windows. If fatally infected, Trojan.Win32.LogonInvader.a will cause system crashes or total disability of the operating system.

Remove Trojan.Win32.LogonInvader.a instantly using anti-virus program. Make sure that its database is up-to-date. Additionally, running other security tools such as anti-malware may help find and remove other modules, which evades anti-virus detection.

What are the Symptoms of Trojan.Win32.LogonInvader.a Infection?

It will modify Windows Registry and add the following entries:

  • [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore]
  • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{F689FD98-DD67-4D13-9259-6644329F9041}]
  • [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer]
  • [HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Run]
  • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run]
  • [HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System]

The threat will drop the following malicious file/files:

  • %System%\winfiles.exe
  • %Windir%\winfiles.exe
  • %Windir%\GessM.exe
  • %ProgramFiles%\server.exe

Follow these Procedures to Remove Trojan.Win32.LogonInvader.a

Procedure 1: Scan Computer in Safe Mode Using Installed Anti-virus Program

1. First, we will try to remove Trojan.Win32.LogonInvader.a by running a virus scan under Safe Mode with Networking. To perform this task, please complete these procedures.

Start in Safe Mode with Networking (Windows XP/Vista/7 Instruction)

- Please restart the computer and just before Windows start, press F8 on your keyboard repeatedly. You will be presented with Advanced Options Menu.
- From the selections, choose Safe Mode with Networking. Please use keyboard's arrow up/down to navigate between selections and press Enter to proceed.


Start Windows 8 in Safe Mode with Networking

- Please restart the computer and as soon as it begins to start, please press Shift+F8 keys.
- Instead of seeing Advance Boot Options, Windows 8 will display Recovery Mode. Continue with the given steps until you reach Safe Mode function.
- Click on 'See advanced repair options'.


- Then, click on Troubleshoot.
- Next, please select Advanced options.
- On the next window, please choose Windows Startup Settings.
- Lastly, click on Restart button. Windows 8 will now restart and boot into Advanced Boot Option wherein you can run the system in Safe Mode with Networking.


2. Open your installed anti-virus programs and update it to the most recent version by automatically downloading necessary updates.

3. Thoroughly scan the computer and remove all identified threats. Do not restart or turn off the computer after the scan process. You still need to run another scan. Please follow the next procedure.

Procedure 2: Scan and remove Trojan.Win32.LogonInvader.a files with MalwareBytes Anti-Malware

To remove Trojan.Win32.LogonInvader.a, download Malwarebytes Anti-Malware by clicking on the button below. This tool is effective in getting rid of Trojans, viruses and malware.

Download Trojan.Win32.LogonInvader.a Removal Tool

1. After downloading, please install the program using the default settings.
2. At the end of the installation, please make sure that it will download necessary updates.
3. Once update has completed. The tool will launch.
4. Thoroughly scan the computer and remove all threats detected by this anti-malware program.

Procedure 3: Run Symantec's ZeroAccess Fix Tool to remove Trojan.Win32.LogonInvader.a components.

This tool from Symantec can remove infections of Trojan.Win32.LogonInvader.a as well as other variants of the same nature.

1. Click on the button below to download ZeroAccess Fix Tool. Save the file FixZeroAccess.exe to your desktop or any convenient location.

Download FixZeroAccess

2. You need to close any running programs before running this tool.
3. Turn OFF System Restore if you are using Windows XP. Trojan.Win32.LogonInvader.a files may hide some of its components on system restore files.
4. Next, browse the folder where you saved the file FixZeroAccess.exe. Double-click on it to initiate the tool. To run the file in Windows Vista and Windows 7, right-click on it and choose 'Run as administrator' from the selection.

Icon of ZeroAccessFix Run As Administrator

5. It will display End User License Agreement (EULA), please click on I accept to use the program.
6.Click on Proceed to begin the removal process, let the tool to run and do its course.
7. If it requires you to restart Windows, please do so. This method may remove Trojan.Win32.LogonInvader.a components such as files and hidden modules.

Restart Windows

8. When Windows starts, ZeroAccess Fix Tool will provide some details of the infection.
9. If it prompts for update, you need to run LiveUpdate to make sure that it contains the most recent virus definitions.
10. Wait for the tool to complete the scan process. When done, it will issue a message and specify identified threats. These threats are removed during the scan process, so, there is no need to worry about their presence.

Procedure 4: Make sure that Trojan.Win32.LogonInvader.a is 100% deleted with Avast aswMBR

A Trojan often drops malware using an advance technology known as rootkit. It hides the installation of Trojan.Win32.LogonInvader.a from your anti-virus program and injects malicious code to running Windows processes. To complete the clean-up process, you also need to scan and remove rootkit Trojan.

1. Download aswMBR from Avast server. Save it to your computer.

Avast Rootkit Scanner

2. Double-click on the file aswMBR.exe to run the program.
3. If it prompts you to download the latest Avast! virus definition, please click Yes. This is necessary to identify most recent version of the Trojan as well as hidden files of Trojan.Win32.LogonInvader.a.

Updating aswMBR

4. Click on Scan button to start checking your computer for presence of rootkit Trojan and other viruses. It will display a message "Scan finished successfully" when done.

aswMBR Scan

5. Click Fix or FixMBR to start removing infection. If aswMBR contains the latest Avast! virus definition file, it will automatically clean infected files on your PC.

Protect your PC from Trojan.Win32.LogonInvader.a or Similar Attack

Turn On Security Features of your Internet Browser

Internet Explorer - Activate SmartScreen Filter

Internet Explorer versions 8 and 9 has this feature called SmartScreen Filter. It helps detect phishing web sites and protect you from downloading malicious files online. You may have avoided Trojan.Win32.LogonInvader.a virus if this has been active on your PC. To turn on SmartScreen Filter, follow these steps:

1. Please open Internet Explorer.
2. On top menu, select Tools (IE 9). For IE 8, please look for Safety menu.
3. Select SmartScreen Filter from the drop-down list and click on Turn on SmartScreen Filter.

IE SmartScreen Filter

4. Please restart Internet Explorer.

SEE MORE : Comprehensive steps to activate SmartScreen Filter

Google Chrome's Enable Phishing and Malware Protection

With Google Chrome's Phishing and Malware Detection feature, you will have lesser risks browsing the web. It will display a warning when the site you are trying to visit is suspicious. To enable Phishing and Malware Protection, please do these steps:

1. Open Google Chrome.
2. Click on the Customize and control Google Chrome (3-Bars Icon) located on top right corner of the browser.
3. Select Settings from the drop-down list.
4. Once on the settings page, click on Show advanced settings... at the bottom of the page to see the rest of the Chrome setup.
5. Locate Privacy section and mark 'Enable phishing and malware protection'.

Chrome Security Settings

6. Please restart Google Chrome. New settings keep your browser safe while surfing the web.

SEE MORE : Enable Phishing and Malware Protection on Google Chrome

Mozilla Firefox - Block Attack Sites and Web Forgeries

Phishing and Malware Protection is a built-in feature on Firefox version 3 or later. It warns you when a page you are trying to visit contains phishing content or an attack site designed to drop threats on the computer. To help you keep safe while browsing the Internet using Firefox, please follow this guide:

1. Open Mozilla Firefox browser.
2. On top menu, click on Open Menu. Then select Options from the list.
3. Select Security and put a check mark on the following items:

  • Warn me when sites try to install add-ons
  • Block reported attack sites
  • Block reported web forgeries

Firefox Security Settings

Leave a Reply

Your email address will not be published. Required fields are marked *