![]() |
|
Per-version report - GetOverX Shield PRO 3.0.2.0 - Printable Version +- GETOVERX FORUM Community Support (https://forum.getoverx.com) +-- Forum: Testing & Validation Center (https://forum.getoverx.com/forumdisplay.php?fid=29) +--- Forum: GetOverX Shield Security Lab (https://forum.getoverx.com/forumdisplay.php?fid=30) +--- Thread: Per-version report - GetOverX Shield PRO 3.0.2.0 (/showthread.php?tid=134) |
Per-version report - GetOverX Shield PRO 3.0.2.0 - mrwebfeeder - 12-10-2025 Tested version: GetOverX Shield PRO 3.0.2.0 Installer SHA-256 hash: [d14632549a82bbb471bf3424b2242a18cac4f5498ecd5cdb4be0b687876dca34] 1. Multi-AV result (VirusTotal) - Engines: 3.0.2.0 - Result: [update, e.g. 1 / 71] - Isolated detection(s), if any: - Vendor: ESET – Win64/WinDivert.A Potentially Unsafe - Reason: [Short explanation. For example: vendor classifies advanced network tools or drivers used by GetOverX Shield PRO as “potentially unsafe applications” due to their low-level capabilities. This is a strict policy decision, not evidence of classic malware.] 2. Behaviour summary in sandbox (MITRE ATT&CK) When the PRO installer was executed in a sandbox environment, the following categories were observed: - Execution: scheduled tasks, use of native Windows APIs, loading of shared modules. - Persistence / Privilege Escalation: creation of startup tasks and services, modification of boot-related registry keys. - Defense Evasion: use of packing/protection techniques, controlled process injection for monitoring and EDR telemetry. - Discovery: collection of system, user and running process information for security analysis. No typical destructive malware behaviours were observed: - No mass encryption of user files. - No deletion of system backup copies. - No exfiltration of documents to external servers. 3. Lab tests (summary) - Clean install and uninstall on fresh Windows 10/11 virtual machines. - Additional tests on systems with existing AV/EDR solutions to verify coexistence. - Verified: - Activation of the hardened firewall and advanced HIPS/EDR components. - Real-time protection and behavioural blocking features. - Centralised logging and retrieval of security events. Conclusion: The tested PRO build behaves as expected for an advanced security product: - The vast majority of external AV engines report no malware. - Any isolated detection is related to strict policies on low-level security tools (drivers, deep network inspection), not a real infection. - Sandbox behaviour analysis shows installation, protection and telemetry activities (services, tasks, monitoring), without ransomware patterns or data theft. Testing Link: https://www.virustotal.com/gui/file/d14632549a82bbb471bf3424b2242a18cac4f5498ecd5cdb4be0b687876dca34 |