Thursday, September 1, 2011

McAfee AVERT Stinger 10.2.0.164

Stinger is a standalone program to detect and remove specific viruses. There is no substitute for full anti-virus protection, but a tool for administrators and users when an infected system. Stinger utilizes next generation of technology spiders, including the analysis process, digitally signed DAT files, and scan performance optimizations.

New versions of Stinger includes all families, and families involved, threats that have achieved a high-risk environment Asssessment. This Stinger is only on the discovery of a new medium or a threat to date.
This version of Stinger includes specific detection and repair W32/Polip only. At that time due to the nature of the algorithm of the infection, repair of files infected W32/Polip not return the files to their original, pre-infected state and can cause problems with self-control applications.


Stinger includes detection for all known variants:
-W32/Anig.worm, -W32/Bagle, -Exploit-DcomRpc, -Exploit-Lsass,
-IRC/Flood.ap, -IRC/Flood.bi, -IRC/Flood.cd, -PWS-Narod,
-W32/Sdbot.worm.gen, -BackDoor-JZ, -BackDoor-AQJ,
-BackDoor-CFB, -Backdoor-CEB, -Bat/Mumu.worm; -IPCScan;
-NTServiceLoader; -PWS-Sincom.dll; -W32/SQLSlammer.worm;
-W32/Bagle.bf - .bgMM; -W32/Bagle.blMM; -W32/Bagle.bj - .bkMM;
-W32/Bagle.bi - bnMM; -W32/Bagle.dldr; -W32/Bagle.bo - btMM;
-W32/Bagle.cc - .dd; -W32/Blaster.worm; -W32/Bropia.worm.a - .p;
-W32/Bropia.worm.bx/by; -W32/Bropia.worm.q - .u;
-W32/Bropia.worm.q - aj; -W32/BugbearMM; -W32/Bugbear.jMM;
-W32/Deborm.worm.gen; -W32/Dumaru; -W32/Dumaru.bd - bgMM;
-W32/Elkern.cav; -W32/Fizzer.genMM; -W32/FunLove;
-W32/IRCBot.worm; -W32/Klez; -W32/Lirva; -W32/Lovgate;
-W32/Lovgate.aqMM; -W32/Lovgate.arMM; -W32/Korgo.worm;
-W32/Korgo.worm.aa.dam; -W32/Korgo.ag - .ai; -W32/Korgo.worm.ae;
-W32/Korgo.worm.aj; -W32/Mimail; -W32/MoFei.worm; -W32/Mumu.b.worm;
-W32/Doomjuice.worm; -W32/Mydoom; -W32/Mydoom.ad - .ahMM;
-W32/Mydoom.anMM; -W32/Mydoom.ao - bbMM; -W32/Mydoom.bc - bdMM;
-W32/Mydoom.beMM; -W32/Mydoom.bf - biMM; W32/Mydoom.bwMM;
-W32/Nachi.worm; -W32/Netsky; -W32/Netsky.agMM; -W32/Nimda;
-W32/Nimda.uMM;-W32/Bagle.ba - .bdMM, -W32/Bagle.bh - bmMM;
-W32/Netsky.ah - .aiMM, -W32/Pate; -W32/Pate.d; -W32/Sasser.worm;
-W32/Sasser.worm.g; -W32/SirCamMM, -W32/Sobig; -W32/Sober;
-W32/Sober.jMM, -W32/Sober.kMM, W32/Sober.lMM;
-W32/Sober.m - .pMM; W32/Sober.rMM; -W32/SwenMM; -W32/YahaMM;
-W32/Zafi; -W32/Zafi.cMM; -W32/Zafi.dMM; -W32/Zafi.eMM;
-W32/Zindos.worm; - W32/Zobot.worm

Windows ME and XP utilize a restore utility that backs up selected files automatically to the C:\_Restore folder. This means that an infected file could be stored there as a backup file, and VirusScan will be unable to delete these files. You must disable the System Restore Utility to remove the infected files from the C:\_Restore folder.


No comments:

Post a Comment