SecCopy.exe

Second Copy

Centered Systems

It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Second Copy’. This file is installed with the program Second Copy 8.
Publisher:
Centered Systems  (signed and verified)

Product:
Second Copy

Description:
SecCopy

Version:
8.0.3.0

MD5:
9c10ad5456f024bd0421ec8d5bfaa977

SHA-1:
70da76bd7c3912906cc0efe90aa36afadcfbf768

SHA-256:
42f83979f2186f88e58d4ce8a75749cdb3a2184ca4e184f28b47c0c89e9e0ede

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
4/25/2024 11:17:26 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Rising Antivirus
Suspicious
23.00.65.131220

File size:
2.8 MB (2,982,712 bytes)

Product version:
8.0

Copyright:
© 1991-2010 All rights reserved

Trademarks:
Second Copy ®

Original file name:
SecCopy.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\second copy 8\seccopy.exe

Digital Signature
Authority:
The USERTRUST Network

Valid from:
4/21/2009 3:00:00 AM

Valid to:
4/22/2011 2:59:59 AM

Subject:
CN=Centered Systems, O=Centered Systems, STREET=7137 Oak Ridge Rd, L=Falls Church, S=VA, PostalCode=22042, C=US

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
00B4FAB760E1E147FD94F94608B1715F3A

File PE Metadata
Compilation timestamp:
12/7/2010 5:43:22 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:FsTSl1zxC79Epm8TBPStFZgRmP1kGNfjOQiw+d+ijTp8cssDqkCxzF:UQ1zxC7GpmMPSHZgRWtCQiFd+ijTpVsT

Entry address:
0xA644D0

Entry point:
60, BE, 00, B0, B9, 00, 8D, BE, 00, 60, 86, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.9102

Packer / compiler:
UPX 2.90LZMA]

Code size:
2.8 MB (2,924,544 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Second Copy

Command:
"C:\Program Files\second copy 8\seccopy.exe"


The file SecCopy.exe has been discovered within the following program.

Second Copy 8  by Centered Systems
www.secondcopy.com
About 6% of users remove it
 
Powered by Should I Remove It?

Scan SecCopy.exe - Powered by Reason Core Security