McAfee AVERT Stinger 10.1.0.1009 | 8 MB
Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations.
New releases of Stinger contain all families, and associated families, of threats that have achieved a Medium of higher Risk Asssessment. This Stinger is only updated upon the discovery of a new Medium or higher threat.
This version of Stinger includes specific detection and repair for W32/Polip only. At this time, because of the nature of the infection algorithm, repair of files infected with W32/Polip may not return the files to their pristine, pre-infected state, and can cause problems with self-checking applications.
Stinger includes detection for all known variants:
-W32/Anig.worm, -W32/Bagle, -Exploit-DcomRpc, -Exploit-Lsass,
-IRC/Flood.ap, -IRC/Flood.bi, -IRC/Flood.cd, -PWS-Narod,
-W32/Sdbot.worm.gen, -BackDoor-JZ, -BackDoor-AQJ,
-BackDoor-CFB, -Backdoor-CEB, -Bat/Mumu.worm; -IPCScan;
-NTServiceLoader; -PWS-Sincom.dll; -W32/SQLSlammer.worm;
-W32/Bagle.bf - .bgMM; -W32/Bagle.blMM; -W32/Bagle.bj - .bkMM;
-W32/Bagle.bi - bnMM; -W32/Bagle.dldr; -W32/Bagle.bo - btMM;
-W32/Bagle.cc - .dd; -W32/Blaster.worm; -W32/Bropia.worm.a - .p;
-W32/Bropia.worm.bx/by; -W32/Bropia.worm.q - .u;
-W32/Bropia.worm.q - aj; -W32/BugbearMM; -W32/Bugbear.jMM;
-W32/Deborm.worm.gen; -W32/Dumaru; -W32/Dumaru.bd - bgMM;
-W32/Elkern.cav; -W32/Fizzer.genMM; -W32/FunLove;
-W32/IRCBot.worm; -W32/Klez; -W32/Lirva; -W32/Lovgate;
-W32/Lovgate.aqMM; -W32/Lovgate.arMM; -W32/Korgo.worm;
-W32/Korgo.worm.aa.dam; -W32/Korgo.ag - .ai; -W32/Korgo.worm.ae;
-W32/Korgo.worm.aj; -W32/Mimail; -W32/MoFei.worm; -W32/Mumu.b.worm;
-W32/Doomjuice.worm; -W32/Mydoom; -W32/Mydoom.ad - .ahMM;
-W32/Mydoom.anMM; -W32/Mydoom.ao - bbMM; -W32/Mydoom.bc - bdMM;
-W32/Mydoom.beMM; -W32/Mydoom.bf - biMM; W32/Mydoom.bwMM;
-W32/Nachi.worm; -W32/Netsky; -W32/Netsky.agMM; -W32/Nimda;
-W32/Nimda.uMM;-W32/Bagle.ba - .bdMM, -W32/Bagle.bh - bmMM;
-W32/Netsky.ah - .aiMM, -W32/Pate; -W32/Pate.d; -W32/Sasser.worm;
-W32/Sasser.worm.g; -W32/SirCamMM, -W32/Sobig; -W32/Sober;
-W32/Sober.jMM, -W32/Sober.kMM, W32/Sober.lMM;
-W32/Sober.m - .pMM; W32/Sober.rMM; -W32/SwenMM; -W32/YahaMM;
-W32/Zafi; -W32/Zafi.cMM; -W32/Zafi.dMM; -W32/Zafi.eMM;
-W32/Zindos.worm; - W32/Zobot.worm
Windows ME and XP utilize a restore utility that backs up selected files automatically to the C:\_Restore folder. This means that an infected file could be stored there as a backup file, and VirusScan will be unable to delete these files. You must disable the System Restore Utility to remove the infected files from the C:\_Restore folder.
Download links :
Hotfile