McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full antivirus protection, but an specialized instrument to assist administrators and users when dealing with infected system. Stinger utilizes next-generation scan technology, such as rootkit scanning, and scan performance optimizations.
McAfee Stinger now finds and removes GameOver Zeus and CryptoLocker.
How can you use Stinger?
Once prompted, choose to save the document to a suitable location on your hard disk, like the Desktop folder.
Once the download is complete, navigate to the folder that comprises the downloaded Stinger record, and run it. If needed, click on the”Customize my scan” link to include additional drives/directories for your scan.
Stinger has the ability to scan targets of Rootkits, which is not allowed by default.
Click the Scan button to begin scanning the given drives/directories.
By default, Stinger will repair any infected files that it finds.
Stinger leverages GTI File Reputation and conducts system heuristics at Moderate level . If you choose”High” or”Very High,” McAfee Labs recommends you put the”On hazard detection” action to”Report” only for the initial scan.
To Find out More about GTI File Reputation watch the following KB articles
KB 53735 – FAQs for Worldwide Threat Intelligence File Reputation
KB 60224 – The best way to confirm that GTI File Reputation is installed properly
KB 65525 – Identification of generically detected malware (Global Threat Intelligence detections)
Join Us freewindows10download.com website
Frequently Asked Questions
Q: I understand I have a virus, however, Stinger didn’t find one. What’s this?
An: Stinger is not a substitute for an entire anti-virus scanner. It’s just designed to find and remove specific threats.
Q: Stinger found a virus it could not repair. What’s this?
A: That is most likely because of Windows System Restore performance having a lock on the infected document. Windows/XP/Vista/7 users should disable system restore before scanning.
Q: Where is your scanning log saved and how can I see them?
A: By default the log file is stored in where Stinger.exe is conducted. Within Stinger, browse to the log TAB and the logs are all displayed as listing with time stamp, clicking on the log file name opens the document in the HTML format.
Q: How Where are the Quarantine documents stored?
A: The quarantine files are stored under C:\Quarantine\Stinger.
This list does not include the results from running a scan.
Q: Why Are there some command-line parameters available when conducting Stinger?
A: Yes, the command-line parameters are exhibited by going to the help menu inside Stinger.
Q: I ran Stinger and finally have a Stinger.opt record, what is that?
A: When Stinger conducts it generates the Stinger.opt file that saves the current Stinger configuration. After you operate Stinger the next time, your prior configuration is used provided that the Stinger.opt document is in precisely the same directory as Stinger.
Q: Stinger updated elements of VirusScan. Is this expected behavior?
A: When the Rootkit scanning alternative is selected within Stinger preferences — VSCore files (mfehidk.sys & mferkdet.sys) to a McAfee endpoint is going to be updated to 15.x. These documents are installed only if newer than what’s about the machine and is needed to scan for the current creation of newer rootkits. In case the rootkit scanning option is disabled in Stinger — that the VSCore update will not happen.
Q: Can Stinger perform rootkit scanning when installed via ePO?
A: We have disabled rootkit scanning from the Stinger-ePO package to limit the vehicle upgrade of VSCore components once an admin deploys Stinger to tens of thousands of machines. To Allow rootkit scanning in ePO style, please utilize these parameters while checking in the Stinger package in ePO:
Q: How What versions of Windows are supported by Stinger?
A: Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7, 8, 10, 10, 2012, 2016, RS1, RS2, RS3, RS4, RS5, 19H1, 19H2. Furthermore, Stinger requires the device to get Internet Explorer 8 or over.
Q: Which are the prerequisites for Stinger to do at a Win PE environment?
A: whilst developing a custom Windows PE picture, add support to HTML Application parts utilizing the instructions offered in this walkthrough.
Q: How How do I get hold for Stinger?
A: Stinger is not a supported application. McAfee Labs makes no warranties concerning this product.
Q: How can I add custom made detections to Stinger?
A: Stinger gets the option where a user may enter upto 1000 MD5 hashes as a customized blacklist. During a system scan, even if any files fit the custom blacklisted hashes – the files will get deleted and noticed. This attribute is provided to assist power users who have isolated an malware sample(s) that no detection is available however in the DAT documents or GTI File Reputation. To leverage this attribute:
- From the Stinger interface goto the Advanced –> Blacklist tab.
- Input MD5 hashes to be detected either through the Enter Hash button or click on the Load hash List button to point to a text file containing MD5 hashes to be included in the scan. SHA1, SHA 256 or other hash types are jobless.
- During a scan, all documents that match the hash will have a detection title of Stinger! . Total dat fix is put on the found file.
- Files that are digitally signed with a valid certification or those hashes which are already marked as clean from GTI File Reputation will not be detected as a member of their custom made blacklist. This is a security feature to prevent users from accidentally deleting documents.
Q: How How can run Stinger with no Real Protect component getting installed?
A: The Stinger-ePO bundle doesn’t execute Real Protect. To Be Able to run Stinger without Real Protect becoming installed, execute Stinger.exe –ePO