Malware

What is “Troj/Wonton-LW”?

Malware Removal

The Troj/Wonton-LW is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Wonton-LW virus can do?

  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Troj/Wonton-LW?


File Info:

name: 3C95CA30A6EDF25510B7.mlw
path: /opt/CAPEv2/storage/binaries/2e664d74f0c2968e74e0d55b2aac71baea0af0dda95e3b53a9f1461361b27272
crc32: C3CA51B0
md5: 3c95ca30a6edf25510b793d8878bf739
sha1: 8e95416f3f9b67230b653aa69183780683caed22
sha256: 2e664d74f0c2968e74e0d55b2aac71baea0af0dda95e3b53a9f1461361b27272
sha512: e106f59c4d11c12445198928699d774a3dc75c87c6abe9034b1cc0f1948a7b02c2a3c004188a74adff9c913c0bd188381bac5309f58bc18a56fbda80885c7df8
ssdeep: 6144:3ucyz4obQmKkWb6ekie+ogU6BYzxl1MASpvJ5Vd67qZ5aXXdAYod4zl:3q4w/ekieZgU6Ul1MASpR5Vo+ra+YBl
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16394E1213546C036E2A71A344BE5DB7A693ABD610B35A8C73BC42BEE5E742C1D73434B
sha3_384: a3bf34d0635df32d50492cbcc7f22de5b048a909673370b20ababd1f6730cfd1f581db28a129f49eab8b69979085cd75
ep_bytes: e8585f0000e989feffff8bff558bec5d
timestamp: 2009-03-28 06:09:52

Version Info:

CompanyName: Microsoft Corporation
FileDescription: Microsoft Office Word
FileVersion: 11.0.5604
InternalName: WinWord
LegalCopyright: Copyright © 1983-2003 Microsoft Corporation. All rights reserved.
LegalTrademarks1: Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2: Windows® is a registered trademark of Microsoft Corporation.
OriginalFilename: WinWord.exe
ProductName: Microsoft Office 2003
ProductVersion: 11.0.5604
Translation: 0x0000 0x04e4

Troj/Wonton-LW also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Agent.touv
tehtrisGeneric.Malware
DrWebTrojan.MulDrop19.57448
MicroWorld-eScanTrojan.GenericKDZ.94634
ClamAVWin.Trojan.Cuegoe-6336261-0
FireEyeTrojan.GenericKDZ.94634
CAT-QuickHealTrojan.Mauvaise.SL1
McAfeeGenericRXCL-HG!3C95CA30A6ED
MalwarebytesWapomi.Virus.FileInfector.DDS
ZillyaDropper.Agent.Win32.132114
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0043c2cb1 )
AlibabaTrojan:Win32/Cuegoe.1008
K7GWTrojan ( 0043c2cb1 )
Cybereasonmalicious.f3f9b6
CyrenW32/Trojan.OTWQ-1482
SymantecBackdoor.Salgorea
APEXMalicious
CynetMalicious (score: 100)
BitDefenderTrojan.GenericKDZ.94634
AvastWin32:Agent-ARGM [Rtk]
TencentTrojan.Win32.Agent.xe
TACHYONTrojan-Dropper/W32.Agent.424448.M
EmsisoftTrojan.GenericKDZ.94634 (B)
BaiduWin32.Trojan-Dropper.Agent.z
VIPRETrojan.GenericKDZ.94634
TrendMicroTROJ_CUEGOE.SM
McAfee-GW-EditionBehavesLike.Win32.Generic.gc
SophosTroj/Wonton-LW
IkarusTrojan-Dropper.Agent
GDataWin32.Trojan.PSE.168GMQ4
JiangminTrojanDropper.Agent.bpmi
Antiy-AVLTrojan[Dropper]/Win32.Agent
XcitiumApplication.Win32.Amonetize.NE@5te978
ArcabitTrojan.Generic.D171AA
ViRobotTrojan.Win32.Agent.438272.BJ
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
AhnLab-V3Dropper/Win32.Agent.R72198
Acronissuspicious
ALYacTrojan.GenericKDZ.94634
MAXmalware (ai score=81)
Cylanceunsafe
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_CUEGOE.SM
RisingBackdoor.[OceanLotus]Salgorea!1.C3DC (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenericKDZ.94364!tr
AVGWin32:Agent-ARGM [Rtk]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Troj/Wonton-LW?

Troj/Wonton-LW removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment