McAfee Stinger is a standalone utility used to detect and remove specific viruses. Stinger uses next-generation scanning technologies, including rootkit scanning, and scan performance optimizations.
McAfee Stinger now finds and removes GameOver Zeus and CryptoLocker.
How can you utilize Stinger?
Q: I know I have a virus, but Stinger didn’t detect one. What’s this?
A: Stinger is not a replacement for a full anti virus scanner. It’s simply supposed to detect and remove specific threats.
Q: Stinger discovered a virus that it could not fix. Why is this?
A: This is probably because of Windows System Restore functionality having a lock to the infected file.Join Us mcafee online scan website Windows/XP/Vista/7 consumers must disable system restore prior to scanning.
Q: Where is the scan log stored and how do I see them?
A: By default the log file is stored from where Stinger.exe is conducted. Within Stinger, navigate into the log TAB and the logs have been displayed as list of time stamp, clicking onto the log file name opens the file from the HTML format.
Q: How Where are the Quarantine files saved?
A: The quarantine files are stored under C:\Quarantine\Stinger.
This list does not include the results of running a scan.
Q: Why Are there some command-line parameters accessible when running Stinger?
A: Yes, the command-line parameters are shown by going to the help menu within Stinger.
Q: I ran Stinger and finally have a Stinger.opt record, what is that?
A: When Stinger conducts it generates the Stinger.opt document which saves the existing Stinger configuration. After you conduct Stinger the second time, your previous configuration is utilized as long as the Stinger.opt document is in the same directory as Stinger.
Q: Stinger updated elements of VirusScan. Is this expected behavior?
A: whenever the Rootkit scanning alternative is selected within Stinger tastes — VSCore files (mfehidk.sys & mferkdet.sys) on a McAfee endpoint is going to be updated to 15.x. These files are set up only if newer than what’s about the machine and is needed to scan for today’s creation of newer rootkits. If the rootkit scanning option is disabled inside Stinger — that the VSCore upgrade will not occur.
Q: Can Stinger work rootkit scanning when installed via ePO?
A: We have disabled rootkit scanning from the Stinger-ePO bundle to restrict the auto update of VSCore parts once an admin deploys Stinger to tens of thousands of machines. To enable rootkit scanning in ePO style, please utilize these parameters while assessing in the Stinger bundle in ePO:
For detailed instructions, please refer to KB 77981
Q: What versions of Windows are supported by Stinger?
A: Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7, 8, 10, 2012, 2016, RS1, RS2, RS3, RS4, RS5, 19H1, 19H2. Additionally, Stinger requires the system to have Web Explorer 8 or above.
Q: What are the prerequisites for Stinger to perform at a Win PE surroundings?
A: when creating a custom Windows PE image, add support to HTML Application components utilizing the directions supplied within this walkthrough.
Q: How do I obtain service for Stinger?
A: Stinger is not a supported program. McAfee Labs makes no warranties about this product.
Q: how How do I add custom made detections to Stinger?
A: Stinger has the choice where a user can enter upto 1000 MD5 hashes as a custom blacklist. During a system scan, if any files match the habit blacklisted hashes – the files will get deleted and detected. This feature is provided to assist power users who have isolated a malware sample(s) that no detection is available however from the DAT documents or GTI File Reputation. To leverage this attribute:
- In the Stinger port goto the Advanced –> Blacklist tab.
- During a scan, all documents that fit the hash is going to have detection title of Stinger! . Complete dat fix is applied on the found file.
- Documents that are digitally signed using a valid certificate or people hashes that are already marked as blank in GTI File Reputation will not be detected as a member of the custom made blacklist. This is a safety feature to prevent users from accidentally deleting documents.
Q: How do conduct Stinger with no Actual Protect component becoming installed?
A: The Stinger-ePO package doesn’t fulfill Actual Protect. So as to conduct Stinger with no Real Protect becoming installed, execute Stinger.exe –ePO