How to Utilize Stinger
McAfee Stinger is a standalone utility used to detect and remove certain viruses. It is not a substitute for full antivirus protection, but also a technical instrument to assist administrators and users when dealing with contaminated system. It finds and eliminates threats identified under the»Threat List» option under Advanced menu choices in the Stinger program.
McAfee Stinger now finds and removes GameOver Zeus and CryptoLocker.
How can you utilize Stinger?
- Download the most recent version of Stinger.
- Once prompted, choose to save the file to a convenient place in your hard disk, such as your Desktop folder.
- When the download is complete, navigate to the folder that comprises the downloaded Stinger file, and execute it.
- By default, Stinger scans for running procedures, loaded modules, registry, WMI and directory locations known to be used by malware onto a system to keep scan times minimum. If needed, click on the»Customize my scanning» link to include extra drives/directories to a scan.
- Stinger has the capacity to scan goals of Rootkits, which is not allowed by default.
- Click on the Scan button to begin scanning the specified drives/directories.
- By default, Stinger will repair any infected files it finds.
- Stinger Requires GTI File Reputation and operates system heuristics at Moderate level . If you select»High» or»Very High,» McAfee Labs recommends that you place the»On threat detection» activity to»Report» just for the first scan.
Q: I understand I have a virus, however, Stinger didn’t find one. What’s this?
A: Stinger isn’t a replacement for a full anti virus scanner. It is just designed to detect and remove specific threats.
Q: Stinger discovered a virus it could not fix. Why is this?
A: That is most likely due to Windows System Restore functionality having a lock onto the infected document. Windows/XP/Vista/7 users must disable system restore prior to scanning.
Q: How Where’s the scanning log stored and how do I view them?
A: By default the log file is stored from where Stinger.exe is conducted. Inside Stinger, browse into the log TAB and the logs will be displayed as record of time stamp, clicking on the log file name opens the file in the HTML format.
Q: Which are the Quarantine files saved?
A: The quarantine files are stored under C:\Quarantine\Stinger.
Q: What is your»Threat List» option under Advanced menu utilized for?
This listing doesn’t include the results from running a scan.
Q: Why Are there any command-line parameters accessible when running Stinger?
A: Yes, even the command-line parameters are exhibited by going to the help menu within Stinger.
Q: I conducted Stinger and now have a Stinger.opt record, what’s that?
A: When Stinger runs it generates the Stinger.opt file which saves the existing Stinger configuration. When you run Stinger the second time, your prior configuration is utilized provided that the Stinger.opt document is in exactly the identical directory as Stinger.
Q: Stinger updated components of VirusScan. Is this expected behavior?
A: whenever the Rootkit scanning option is chosen within Stinger preferences — VSCore files (mfehidk.sys & mferkdet.sys) on a McAfee endpoint will be upgraded to 15.x. These documents are installed only if newer than what’s about the machine and is required to scan for today’s creation of newer rootkits. In the event the rootkit scanning alternative is disabled in Stinger — that the VSCore upgrade will not occur.
Q: Can Stinger perform rootkit scanning when installed via ePO?
A: We’ve disabled rootkit scanning at the Stinger-ePO package to restrict the vehicle upgrade of VSCore components as soon as an admin deploys Stinger to tens of thousands of machines. To enable rootkit scanning in ePO style, please use these parameters while assessing in the Stinger package in ePO:
For detailed directions, please refer to KB 77981
Q: What versions of Windows are supported by Stinger?
A: Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7, 8, 10, 10, 2012, 2016, RS1, RS2, RS3, RS4, RS5, 19H1, 19H2. In addition, Stinger requires the machine to have Internet Explorer 8 or over.
Q: Which are the requirements for Stinger to execute in a Win PE environment?
A: While developing a custom Windows PE image, add support to HTML Application parts using the instructions offered in this walkthrough.
Q: How do I get service for Stinger?
A: Stinger is not a supported application. McAfee Labs makes no guarantees about this product.
Q: How How do I add customized detections into Stinger?
A: Stinger gets the choice where a user may enter upto 1000 MD5 hashes as a customized blacklist. During a system scan, even if any files fit the custom blacklisted hashes — the documents will get detected and deleted. This attribute is provided to assist power users who have isolated an malware sample(s) that no detection is available however in the DAT files or GTI File Reputation.
- Input MD5 hashes to be discovered either via the Input Hash button or click on the Load hash List button to point to a text file containing MD5 hashes to be included in the scanning.
- During a scan, all files that match the hash will have a detection title of Stinger! . Total dat fix is used on the file.
- Files which are digitally signed using a valid certification or those hashes that are already marked as clean from GTI File Reputation won’t be detected as part of their customized blacklist. This is a safety feature to prevent users from accidentally deleting documents.
Join Us stinger mcafee website
Q: How How do conduct Stinger with no Real Protect component becoming installed?
A: The Stinger-ePO bundle does not fulfill Actual Protect. In order to operate Stinger without Real Protect getting installed, do Stinger.exe —ePO