GETOVERX FORUM Community Support
Per-version report - GetOverX Shield Server 3.0.2.0 - Printable Version

+- GETOVERX FORUM Community Support (https://forum.getoverx.com)
+-- Forum: Testing & Validation Center (https://forum.getoverx.com/forumdisplay.php?fid=29)
+--- Forum: GetOverX Shield Security Lab (https://forum.getoverx.com/forumdisplay.php?fid=30)
+--- Thread: Per-version report - GetOverX Shield Server 3.0.2.0 (/showthread.php?tid=135)



Per-version report - GetOverX Shield Server 3.0.2.0 - mrwebfeeder - 12-10-2025

Tested version: GetOverX Shield Server 3.0.2.0
Installer SHA-256 hash: [550e7b347f6011bb9d6a35c59382412b5bde7c3454549c24110a225c3cf4ad46]

1. Multi-AV result (VirusTotal)
- Engines: [update with engine count]
- Result: [1 / 71]
- Isolated detection(s), if any:
  - Vendor: ESET – Win64/WinDivert.A Potentially Unsafe
  - Reason: Server edition also uses low-level drivers and network inspection modules that some vendors classify as “potentially unsafe applications” by policy, especially on servers.

2. Behaviour summary in sandbox (MITRE ATT&CK)
When the Server installer was executed in a sandbox environment, the following categories were observed:
- Execution: service installation and use of native Windows Server APIs.
- Persistence / Privilege Escalation: creation of Windows services set to start at boot, modification of relevant registry keys.
- Defense Evasion: protected components, code packing and controlled injection into own processes for monitoring.
- Discovery: system, role and process discovery typical for a server protection agent (services, listening ports, installed roles/features).

No malicious server-side behaviours were observed:
- No unauthorised modification of business data.
- No tampering with domain controllers, AD objects or database services.
- No exfiltration of server data to unknown external endpoints.

3. Lab tests (summary)
- Installation and removal on clean Windows Server virtual machines (2016/2019/2022).
- Verified:
  - Service stability under load.
  - Interaction with typical server roles (file server, web server, domain member).
  - Logging and remote management from the console.

Conclusion:
The tested Server build behaves as expected for an endpoint protection agent on Windows Server:
- External AV engines do not report classic malware; any isolated detection is related to the presence of powerful administration/security components.
- Behavioural analysis shows service deployment, monitoring and hardening activities, without backdoor or ransomware-like patterns.
Link Test:
https://www.virustotal.com/gui/file/550e7b347f6011bb9d6a35c59382412b5bde7c3454549c24110a225c3cf4ad46