SecCopy.exe

Second Copy

Centered Systems

It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Second Copy’. This file is installed with the program Second Copy 8.
Publisher:
Centered Systems  (signed and verified)

Product:
Second Copy

Description:
SecCopy

Version:
8.1.1.0

MD5:
55b6023589430178b406f3297675543d

SHA-1:
d6ca6dff4c0e3795a7ea58420a9e54cfa4538f03

SHA-256:
15bd6f8e0a4cffad8271dadd75d848a879dbe2a8a261a05a6eae6b4fc14d07b8

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
4/19/2024 11:10:08 AM UTC  (today)

Scan engine
Detection
Engine version

Rising Antivirus
Suspicious
23.00.65.14117

File size:
3 MB (3,128,616 bytes)

Product version:
8.1

Copyright:
© 1991-2012 Centered Systems. All Rights Reserved.

Trademarks:
Second Copy ®

Original file name:
SecCopy.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\second copy 8\seccopy.exe

Digital Signature
Authority:
The USERTRUST Network

Valid from:
5/12/2011 2:00:00 AM

Valid to:
5/12/2014 1:59:59 AM

Subject:
CN=Centered Systems, O=Centered Systems, STREET=7137 Oak Ridge Rd, L=Falls Church, S=VA, PostalCode=22042, C=US

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
00FA38555401DF446270E5F1CB64D3E263

File PE Metadata
Compilation timestamp:
11/20/2012 3:58:39 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:uC0UqRJtAlwVxdhhYG/O/+D5sJpqdrDhe6XOWlWiaB4GsNz3a+MbrGYOx:up/jKMdsusadrDhVXOOWQF3adO

Entry address:
0xADF070

Entry point:
60, BE, 00, 20, BF, 00, 8D, BE, 00, F0, 80, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Code size:
2.9 MB (3,072,000 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Second Copy

Command:
"C:\Program Files\second copy 8\seccopy.exe" \initialwait=5


The file SecCopy.exe has been discovered within the following program.

Second Copy 8  by Centered Systems
www.secondcopy.com
About 6% of users remove it
 
Powered by Should I Remove It?

Scan SecCopy.exe - Powered by Reason Core Security