McAfee Stinger is a standalone energy utilized to detect and also eliminate details viruses. It’& rsquo; s not a replacement for complete anti-viruses defense, however a specialized tool to aid managers as well as individuals when dealing with infected system. Stinger utilizes next-generation scan innovation, consisting of rootkit scanning, and also scan efficiency optimizations. It detects and removes dangers identified under the “” Threat Listing”” option under Advanced food selection options in the Stinger application.

McAfee Stinger now discovers and removes GameOver Zeus and CryptoLocker.

Exactly how do you use Stinger?

  1. Download and install the most up to date variation of Stinger.
  2. When prompted, choose to conserve the documents to a convenient place on your hard drive, such as your Desktop computer folder.
  3. When the download is full, browse to the folder that contains the downloaded and install Stinger file, as well as run it.
  4. The Stinger user interface will be presented.
  5. By default, Stinger scans for running processes, loaded modules, computer registry, WMI as well as directory locations recognized to be made use of by malware on an equipment to keep scan times minimal. If essential, click the “” Customize my check”” link to include additional drives/directories to your check.
  6. Stinger has the capability to scan targets of Rootkits, which is not enabled by default.
  7. Click the Check button to start checking the defined drives/directories.
  8. By default, Stinger will certainly fix any type of contaminated documents it finds.
  9. Stinger leverages GTI Documents Track record as well as runs network heuristics at Medium degree by default. If you select “” High”” or “” Really High,”” McAfee Labs suggests that you set the “” On hazard discovery”” action to “” Record”” only for the very first check.

    To find out more regarding GTI Data Online reputation see the adhering to KB short articles

    KB 53735 – FAQs for Global Hazard Knowledge Documents Online Reputation

    KB 60224 – Just how to verify that GTI Documents Online reputation is set up correctly

    KB 65525 – Recognition of generically found malware (Global Danger Knowledge discoveries)

you can find more here from Our Articles

Frequently Asked Questions

Q: I understand I have a virus, but Stinger did not spot one. Why is this?
A: Stinger is not an alternative to a full anti-virus scanner. It is only developed to find and remove specific threats.

Q: Stinger found a virus that it couldn'’ t repair service. Why is this? A: This is probably as a result of Windows System Recover capability having a lock on the contaminated data. Windows/XP/Vista/ 7 individuals need to disable system bring back before scanning.

Q: Where is the scan log saved and just how can I view them?
A: By default the log data is saved from where Stinger.exe is run. Within Stinger, navigate to the log TAB as well as the logs are shown as list with time stamp, clicking the log documents name opens the data in the HTML layout.

Q: Where are the Quarantine submits kept?
A: The quarantine files are stored under C: \ Quarantine \ Stinger.

Q: What is the “” Threat Listing”” choice under Advanced menu made use of for?
A: The Threat List supplies a checklist of malware that Stinger is configured to spot. This checklist does not include the results from running a check.

Q: Exist any command-line specifications available when running Stinger?
A: Yes, the command-line specifications are presented by mosting likely to the aid menu within Stinger.

Q: I ran Stinger and also now have a Stinger.opt documents, what is that?
A: When Stinger runs it produces the Stinger.opt file that saves the present Stinger setup. When you run Stinger the next time, your previous setup is made use of as long as the Stinger.opt data is in the very same directory as Stinger.

Q: Stinger updated elements of VirusScan. Is this expected actions?
A: When the Rootkit scanning alternative is selected within Stinger preferences –– VSCore data (mfehidk.sys & & mferkdet.sys) on a McAfee endpoint will be upgraded to 15.x. These data are set up only if newer than what'’ s on the system and is required to scan for today’& rsquo; s generation of newer rootkits. If the rootkit scanning option is impaired within Stinger –– the VSCore update will not happen.

Q: Does Stinger carry out rootkit scanning when released using ePO?
A: We’& rsquo; ve disabled rootkit scanning in the Stinger-ePO bundle to restrict the car upgrade of VSCore elements when an admin deploys Stinger to hundreds of equipments. To allow rootkit scanning in ePO mode, please use the following criteria while checking in the Stinger package in ePO:

— reportpath=%temperature%– rootkit

For thorough directions, please refer to KB 77981

Q: What variations of Windows are supported by Stinger?
A: Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7, 8, 10, 2012, 2016, RS1, RS2, RS3, RS4, RS5, 19H1, 19H2. Furthermore, Stinger requires the machine to have Web Explorer 8 or above.

Q: What are the demands for Stinger to perform in a Win PE environment?
A: While creating a custom Windows PE image, add support for HTML Application elements making use of the instructions given in this walkthrough.

Q: Exactly how can I get support for Stinger?
A: Stinger is not a supported application. McAfee Labs makes no assurances concerning this product.

Q: Just how can I include customized discoveries to Stinger?
A: Stinger has the option where a customer can input upto 1000 MD5 hashes as a personalized blacklist. Throughout a system scan, if any kind of data match the personalized blacklisted hashes – the files will obtain found as well as erased. This attribute is provided to aid power customers that have actually isolated a malware sample(s) for which no discovery is available yet in the DAT files or GTI File Online Reputation. To take advantage of this feature:

  1. From the Stinger user interface goto the Advanced–> > Blacklist tab.
  2. Input MD5 hashes to be detected either by means of the Get in Hash button or click the Tons hash List switch to point to a text file including MD5 hashes to be consisted of in the scan. SHA1, SHA 256 or various other hash types are in need of support.
  3. Throughout a check, data that match the hash will certainly have a discovery name of Stinger!<>. Complete dat repair service is used on the found file.
  4. Data that are electronically signed making use of a valid certification or those hashes which are currently marked as clean in GTI File Reputation will not be spotted as part of the custom-made blacklist. This is a safety attribute to avoid individuals from mistakenly removing data.

Q: Exactly how can run Stinger without the Real Protect part obtaining mounted?
A: The Stinger-ePO bundle does not carry out Real Protect. In order to run Stinger without Real Protect getting mounted, execute Stinger.exe