sc8.exe

Second Copy

Centered Systems

The program is a setup application that uses the Inno Setup installer.
Publisher:
Centered Systems   (signed by Centered Systems)

Product:
Second Copy

Version:
8.0.5.2

MD5:
1387098e1989cc1e3e4ed2e657e3ca3c

SHA-1:
bd9c38720f2a9fa776d7e616666599748a6681c9

SHA-256:
997e096d1a85c46373afd4ab02e6c3e9e762e1f2f0e42effa1af0e32f2252ac0

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
9/26/2017 10:11:10 AM UTC  (today)

File size:
4.8 MB (5,085,184 bytes)

Product version:
8.0.5.2

Copyright:
©1991-2011 Centered Systems

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Common path:
C:\Program Files\second copy 8\setup\sc8.exe

Digital Signature
Authority:
The USERTRUST Network

Valid from:
5/12/2011 3:00:00 AM

Valid to:
5/12/2014 2:59:59 AM

Subject:
CN=Centered Systems, O=Centered Systems, STREET=7137 Oak Ridge Rd, L=Falls Church, S=VA, PostalCode=22042, C=US

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
00FA38555401DF446270E5F1CB64D3E263

File PE Metadata
Compilation timestamp:
4/10/2010 7:57:59 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:xNt+TfqYB963yUyFqDw0HLo/sLCothfYvoLMCE1TG2BiTxjhLeDdnF:x7gbE3ypEAdoLe1T/MTJoRF

Entry address:
0x163C4

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 54, 55, 41, 00, E8, 70, 04, FF, FF, 33, C0, 55, 68, 91, 6A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 4D, 6A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, AB, 41, 00, E8, A6, EF, FF, FF, E8, B1, EA, FF, FF, 8D, 55, EC, 33, C0, E8, FB, 87, FF, FF, 8B, 55, EC, B8, B0, D6, 41, 00, E8, A6, EA, FE, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, B0, D6, 41, 00, B2, 01...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
85 KB (87,040 bytes)

Scan sc8.exe - Powered by Reason Core Security