McAfee Stinger is a standalone energy utilized to spot and also get rid of certain viruses. It’& rsquo; s not a substitute for complete antivirus security, however a specialized tool to aid administrators and also customers when dealing with contaminated system. Stinger makes use of next-generation scan innovation, including rootkit scanning, and scan performance optimizations. It spots as well as eliminates dangers identified under the “” Threat List”" alternative under Advanced menu options in the Stinger application. 
McAfee Stinger now identifies as well as eliminates GameOver Zeus and CryptoLocker.
Exactly how do you make use of Stinger?
- Download the most recent variation of Stinger.
- When motivated, pick to save the data to a hassle-free area on your hard drive, such as your Desktop computer folder.
- When the download is full, browse to the folder which contains the downloaded Stinger file, and also run it.
- The Stinger interface will certainly be displayed.
- By default, Stinger scans for running processes, packed modules, windows registry, WMI and also directory locations recognized to be utilized by malware on a maker to maintain check times marginal. If needed, click the “” Customize my check”" web link to add additional drives/directories to your scan.
- Stinger has the capability to scan targets of Rootkits, which is not enabled by default.
- Click the Check switch to begin checking the specified drives/directories.
- By default, Stinger will certainly repair any type of contaminated files it discovers.
- Stinger leverages GTI Documents Track record as well as runs network heuristics at Medium level by default. If you pick “” High”" or “” Very High,”" McAfee Labs advises that you establish the “” On hazard discovery”" activity to “” Report”" only for the initial check.
For more information concerning GTI File Online reputation see the adhering to KB short articles KB 53735 - Frequently Asked Questions for International Hazard Intelligence File Online Reputation KB 60224 - Just how to validate that GTI Data Track record is installed appropriately KB 65525 - Identification of generically detected malware (International Threat Intelligence detections) 
Read here stinger mcafee At our site
Frequently Asked Questions
Q: I know I have a virus, but Stinger did not find one. Why is this? 
A: Stinger is not an alternative to a complete anti-virus scanner. It is just designed to find and eliminate certain dangers.
Q: Stinger located a virus that it couldn'’ t repair. Why is this? A: This is probably because of Windows System Restore functionality having a lock on the infected documents. Windows/XP/Vista/ 7 individuals ought to disable system restore prior to scanning.
Q: Where is the check log conserved as well as how can I view them?
A: By default the log data is saved from where Stinger.exe is run. Within Stinger, navigate to the log TAB as well as the logs are presented as checklist with time stamp, clicking the log documents name opens up the data in the HTML layout.
Q: Where are the Quarantine files kept? 
A: The quarantine documents are stored under C: \ Quarantine \ Stinger.
Q: What is the “” Threat Listing”" option under Advanced food selection utilized for? 
A: The Risk Checklist gives a list of malware that Stinger is set up to spot. This listing does not have the arise from running a check.
Q: Are there any type of command-line parameters available when running Stinger? 
A: Yes, the command-line specifications are presented by mosting likely to the aid food selection within Stinger.
Q: I ran Stinger and also currently have a Stinger.opt documents, what is that? 
A: When Stinger runs it creates the Stinger.opt documents that conserves the present Stinger setup. When you run Stinger the next time, your previous arrangement is utilized as long as the Stinger.opt data is in the very same directory as Stinger.
Q: Stinger updated parts of VirusScan. Is this expected habits?
A: When the Rootkit scanning choice is picked within Stinger preferences –- VSCore documents (mfehidk.sys & & mferkdet.sys) on a McAfee endpoint will certainly be updated to 15.x. These documents are mounted just if more recent than what'’ s on the system as well as is required to scan for today’& rsquo; s generation of more recent rootkits. If the rootkit scanning choice is handicapped within Stinger –- the VSCore upgrade will certainly not happen.
Q: Does Stinger perform rootkit scanning when released using ePO?
A: We’& rsquo; ve disabled rootkit scanning in the Stinger-ePO package to limit the car update of VSCore components when an admin deploys Stinger to thousands of devices. To make it possible for rootkit scanning in ePO setting, please make use of the following criteria while checking in the Stinger plan in ePO:
- reportpath=%temperature%- rootkit
For thorough guidelines, please describe KB 77981
Q: What versions of Windows are supported by Stinger?
A: Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7, 8, 10, 2012, 2016, RS1, RS2, RS3, RS4, RS5, 19H1, 19H2. Furthermore, Stinger calls for the machine to have Internet Explorer 8 or above.
Q: What are the demands for Stinger to execute in a Win PE environment?
A: While producing a custom Windows PE image, add assistance for HTML Application elements using the directions provided in this walkthrough.
Q: Just how can I obtain assistance for Stinger? 
A: Stinger is not a supported application. McAfee Labs makes no warranties regarding this item.
Q: How can I include customized discoveries to Stinger?
A: Stinger has the choice where a user can input upto 1000 MD5 hashes as a personalized blacklist. During a system scan, if any documents match the custom-made blacklisted hashes - the files will obtain identified and also erased. This attribute is supplied to assist power individuals who have isolated a malware example(s) for which no detection is readily available yet in the DAT data or GTI File Track Record. To utilize this function:
- From the Stinger interface goto the Advanced-> > Blacklist tab.
- Input MD5 hashes to be spotted either through the Go into Hash switch or click the Lots hash Listing switch to indicate a text file containing MD5 hashes to be included in the scan. SHA1, SHA 256 or other hash types are unsupported.
- Throughout a scan, data that match the hash will have a discovery name of Stinger!<>. Full dat repair is used on the spotted documents.
- Documents that are digitally signed making use of a legitimate certification or those hashes which are currently noted as clean in GTI Data Reputation will certainly not be discovered as part of the custom blacklist. This is a safety function to stop customers from unintentionally removing documents.
Q: How can run Stinger without the Genuine Protect part getting mounted? 
A: The Stinger-ePO plan does not carry out Actual Protect. In order to run Stinger without Real Protect obtaining set up, implement Stinger.exe