McAfee Stinger is a standalone energy made use of to identify and also get rid of details viruses. It’& rsquo; s not a replacement for full anti-viruses security, however a specialized tool to aid administrators and customers when dealing with infected system. Stinger makes use of next-generation check technology, consisting of rootkit scanning, and scan efficiency optimizations. It spots and gets rid of threats determined under the “” Hazard Checklist”” alternative under Advanced menu choices in the Stinger application.

McAfee Stinger currently identifies as well as gets rid of GameOver Zeus as well as CryptoLocker.

Just how do you utilize Stinger?

  1. Download the most recent variation of Stinger.
  2. When motivated, pick to save the file to a practical area on your hard drive, such as your Desktop computer folder.
  3. When the download is full, navigate to the folder which contains the downloaded Stinger file, and run it.
  4. The Stinger interface will certainly be shown.
  5. By default, Stinger checks for running procedures, filled components, computer system registry, WMI as well as directory locations recognized to be made use of by malware on a device to maintain scan times minimal. If required, click the “” Customize my scan”” web link to add extra drives/directories to your scan.
  6. Stinger has the capacity to scan targets of Rootkits, which is not allowed by default.
  7. Click the Scan switch to start scanning the specified drives/directories.
  8. By default, Stinger will repair any type of contaminated files it locates.
  9. Stinger leverages GTI Data Reputation and also runs network heuristics at Medium level by default. If you select “” High”” or “” Very High,”” McAfee Labs suggests that you establish the “” On danger discovery”” action to “” Record”” just for the first scan.

    For more information regarding GTI Documents Online reputation see the adhering to KB write-ups

    KB 53735 – Frequently Asked Questions for Worldwide Threat Knowledge Data Track Record

    KB 60224 – How to verify that GTI Documents Track record is installed correctly

    KB 65525 – Recognition of generically detected malware (Global Risk Intelligence detections)

follow the link stinger antiviren At our site

Frequently Asked Questions

Q: I recognize I have a virus, but Stinger did not identify one. Why is this?
A: Stinger is not an alternative to a complete anti-virus scanner. It is only developed to find as well as remove details risks.

Q: Stinger found a virus that it couldn'’ t repair work. Why is this? A: This is most likely due to Windows System Restore functionality having a lock on the infected documents. Windows/XP/Vista/ 7 users ought to disable system restore before scanning.

Q: Where is the scan log saved and how can I see them?
A: By default the log file is saved from where Stinger.exe is run. Within Stinger, navigate to the log TAB and also the logs are presented as list with time stamp, clicking on the log file name opens up the data in the HTML style.

Q: Where are the Quarantine files stored?
A: The quarantine data are stored under C: \ Quarantine \ Stinger.

Q: What is the “” Hazard List”” choice under Advanced menu utilized for?
A: The Risk Checklist supplies a listing of malware that Stinger is set up to discover. This listing does not include the results from running a scan.

Q: Exist any kind of command-line criteria readily available when running Stinger?
A: Yes, the command-line specifications are displayed by going to the help menu within Stinger.

Q: I ran Stinger as well as now have a Stinger.opt file, what is that?
A: When Stinger runs it creates the Stinger.opt file that conserves the present Stinger arrangement. When you run Stinger the next time, your previous setup is utilized as long as the Stinger.opt file is in the same directory site as Stinger.

Q: Stinger upgraded components of VirusScan. Is this expected behavior?
A: When the Rootkit scanning choice is picked within Stinger choices –– VSCore documents (mfehidk.sys & & mferkdet.sys) on a McAfee endpoint will be upgraded to 15.x. These documents are installed only if newer than what'’ s on the system and is required to check for today’& rsquo; s generation of newer rootkits. If the rootkit scanning alternative is impaired within Stinger –– the VSCore upgrade will certainly not happen.

Q: Does Stinger carry out rootkit scanning when deployed via ePO?
A: We’& rsquo; ve impaired rootkit scanning in the Stinger-ePO plan to limit the car upgrade of VSCore parts when an admin releases Stinger to countless equipments. To enable rootkit scanning in ePO mode, please make use of the complying with parameters while checking in the Stinger bundle in ePO:

— reportpath=%temp%– rootkit

For detailed guidelines, please refer to KB 77981

Q: What variations of Windows are sustained by Stinger?
A: Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7, 8, 10, 2012, 2016, RS1, RS2, RS3, RS4, RS5, 19H1, 19H2. Furthermore, Stinger calls for the maker to have Net Explorer 8 or above.

Q: What are the demands for Stinger to implement in a Win PE atmosphere?
A: While creating a personalized Windows PE photo, add support for HTML Application components making use of the instructions offered in this walkthrough.

Q: Just how can I obtain assistance for Stinger?
A: Stinger is not a supported application. McAfee Labs makes no assurances regarding this item.

Q: Exactly how can I add custom discoveries to Stinger?
A: Stinger has the alternative where an individual can input upto 1000 MD5 hashes as a custom blacklist. During a system check, if any type of documents match the custom blacklisted hashes – the data will get identified as well as removed. This attribute is offered to assist power individuals that have actually isolated a malware sample(s) for which no discovery is offered yet in the DAT data or GTI File Reputation. To take advantage of this feature:

  1. From the Stinger user interface goto the Advanced–> > Blacklist tab.
  2. Input MD5 hashes to be found either using the Go into Hash switch or click the Tons hash Listing switch to point to a text file consisting of MD5 hashes to be included in the check. SHA1, SHA 256 or various other hash types are unsupported.
  3. During a scan, data that match the hash will certainly have a discovery name of Stinger!<>. Complete dat repair service is applied on the identified file.
  4. Documents that are electronically signed using a valid certification or those hashes which are currently marked as clean in GTI Documents Reputation will certainly not be detected as part of the custom-made blacklist. This is a security attribute to prevent customers from mistakenly deleting data.

Q: How can run Stinger without the Real Protect element getting set up?
A: The Stinger-ePO bundle does not perform Actual Protect. In order to run Stinger without Real Protect getting set up, carry out Stinger.exe