SecCopy.exe

Second Copy

Centered Systems

It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Second Copy’. This file is installed with the program Second Copy 8.
Publisher:
Centered Systems  (signed and verified)

Product:
Second Copy

Description:
SecCopy

Version:
8.0.5.2

MD5:
7e939fe3d05217d18b97f6a68eefbfda

SHA-1:
c296d25790529cb432d5335c4bccac02937b5721

SHA-256:
11e2c9ef0ffbcd973785122cf0fd9213f1663662579330a330434ffaf6f90248

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
4/18/2024 9:48:35 PM UTC  (today)

Scan engine
Detection
Engine version

Rising Antivirus
Suspicious
23.00.65.14102

File size:
2.8 MB (2,983,208 bytes)

Product version:
8.0

Copyright:
© 1991-2011 All rights reserved

Trademarks:
Second Copy ®

Original file name:
SecCopy.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\second copy 8\seccopy.exe

Digital Signature
Authority:
The USERTRUST Network

Valid from:
5/12/2011 12:00:00 PM

Valid to:
5/12/2014 11:59:59 AM

Subject:
CN=Centered Systems, O=Centered Systems, STREET=7137 Oak Ridge Rd, L=Falls Church, S=VA, PostalCode=22042, C=US

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
00FA38555401DF446270E5F1CB64D3E263

File PE Metadata
Compilation timestamp:
8/13/2011 9:22:29 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:Jgt9lJpDVqmx52CY7Dc3KumPmz4Xe3hdpIVXPXTMsV79qOmOHJzVZaRTyl7:JCz98CY7qgPFXKH6PXTM679qPOHJzuti

Entry address:
0xA65A40

Entry point:
60, BE, 00, C0, B9, 00, 8D, BE, 00, 50, 86, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.9102

Packer / compiler:
UPX 2.90LZMA]

Code size:
2.8 MB (2,924,544 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Second Copy

Command:
"C:\Program Files\second copy 8\seccopy.exe" \initialwait=10


The file SecCopy.exe has been discovered within the following program.

Second Copy 8  by Centered Systems
www.secondcopy.com
About 6% of users remove it
 
Powered by Should I Remove It?

Scan SecCopy.exe - Powered by Reason Core Security