It’s not a substitute for full antivirus protection, but an specialized tool to assist administrators and users when dealing with contaminated system. It detects and removes threats identified under the»Threat List» option under Advanced menu choices in the Stinger program.
McAfee Stinger now finds and eliminates GameOver Zeus and CryptoLocker.
How do you use Stinger?
- Download the latest version of Stinger.
- Once prompted, choose to save the document to a convenient place on your hard disk, such as your Desktop folder.
- When the downloading is complete, browse to the folder which contains the downloaded Stinger record, and execute it.
- The Stinger interface will be displayed. If needed, click on the»Customize my scanning» link to add extra drives/directories for a scan.
- Stinger has the capacity to scan goals of Rootkits, which isn’t allowed by default.
- Click the Scan button to start scanning the given drives/directories.
- Stinger Requires GTI File Reputation and conducts community heuristics at Medium level by default. If you choose»High» or»Very High,» McAfee Labs recommends that you put the»On hazard detection» actions to»Report» just for the initial scan.
Q: I know I have a virus, but Stinger did not find one. What’s this?
A: Stinger isn’t a replacement for a full anti virus scanner. It is just supposed to detect and remove certain threats.Q: Stinger found a virus that it could not repair. Why is this?
A: That is most likely due to Windows System Restore performance using a lock to the infected document. Windows/XP/Vista/7 users must disable system restore before scanning.Q: how Where is your scanning log stored and how do I see them?
A: By default the log file is saved from where Stinger.exe is conducted. Within Stinger, browse into the log TAB and the logs will be displayed as record of time stamp, clicking onto the log file name opens the file in the HTML format.Q: How Which are the Quarantine documents saved?
A: The quarantine files are stored under C:\Quarantine\Stinger.This list doesn’t include the results of running a scan.
Q: Are there any command-line parameters available when conducting Stinger?
A: Yes, the command-line parameters have been displayed by going to the help menu inside Stinger.Q: I ran Stinger and now have a Stinger.opt record, what is that?
A: When Stinger runs it creates the Stinger.opt file which saves the existing Stinger configuration. When you conduct Stinger the second time, your previous configuration is used as long as the Stinger.opt document is in precisely the exact same directory as Stinger.Is this expected behaviour?
A: whenever the Rootkit scanning option is chosen within Stinger preferences — VSCore files (mfehidk.sys & mferkdet.sys) on a McAfee endpoint will be updated to 15.x. These files are installed only if newer than what’s about the machine and is required to scan for today’s creation of newer rootkits. In the event the rootkit scanning option is disabled in Stinger — the VSCore update will not occur.Q: Does Stinger work rootkit scanning when deployed via ePO?
A: We’ve disabled rootkit scanning in the Stinger-ePO package to restrict the auto update of VSCore parts when an admin deploys Stinger to thousands of machines. To Allow rootkit scanning in ePO manner, please utilize these parameters while checking in the Stinger bundle in ePO:–reportpath=%yolk% –rootkit
Q: What versions of Windows are backed by Stinger?
Additionally, Stinger requires the system to have Web Explorer 8 or over.Q: What are the prerequisites for Stinger to execute in a Win PE surroundings?
A: whilst developing a custom Windows PE image, add support for HTML Application components utilizing the instructions provided within this walkthrough.Q: How How can I get support for Stinger?
A: Stinger isn’t a supported application. McAfee Labs makes no warranties concerning this product.Q: how How do I add custom detections into Stinger?
A: Stinger gets the choice where a user may input upto 1000 MD5 hashes as a custom blacklist. Throughout a system scan, even if any files match the habit blacklisted hashes – the files will get deleted and detected. This attribute is provided to help power users that have isolated an malware sample(s) that no detection can be found yet in the DAT files or GTI File Reputation. - Input MD5 hashes to be discovered either via the Enter Hash button or click the Load hash List button to point to a text file containing MD5 hashes to be contained in the scan.
- During a scan, files which match the hash will have a detection name of Stinger! . Complete dat repair is used on the detected file.
- Documents that are digitally signed with a valid certificate or those hashes that are marked as blank in GTI File Reputation will not be detected as part of their custom blacklist. This is a security feature to prevent customers from accidentally deleting documents.
Read here stinger mcafee At our site
Q: How can run Stinger with no Actual Protect component getting installed?
A: The Stinger-ePO bundle doesn’t execute Real Protect. To Be Able to operate Stinger without Real Protect becoming installed, do Stinger.exe –ePO

Deja una respuesta