SecCopy.exe

Second Copy

Centered Systems

It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Second Copy’. This file is installed with the program Second Copy 8.
Publisher:
Centered Systems  (signed and verified)

Product:
Second Copy

Description:
SecCopy

Version:
8.0.4.1

MD5:
2fdc3f65d5b420254dd1febab9a20e06

SHA-1:
dc9a7cc1dad7e463f5c2e344a1bb9c511f5d8e0c

SHA-256:
cbcb44df5cbaaf32c1c58bf9b93a4c4cb2fc15b47619cb37a82c7cbf2ac7b459

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
11/15/2024 11:37:57 AM UTC  (today)

Scan engine
Detection
Engine version

Bkav FE
HW32.CDB
1.3.0.4246

File size:
2.9 MB (2,999,592 bytes)

Product version:
8.0

Copyright:
© 1991-2011 All rights reserved

Trademarks:
Second Copy ®

Original file name:
SecCopy.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\second copy 8\seccopy.exe

Digital Signature
Authority:
The USERTRUST Network

Valid from:
5/12/2011 4:30:00 AM

Valid to:
5/12/2014 4:29:59 AM

Subject:
CN=Centered Systems, O=Centered Systems, STREET=7137 Oak Ridge Rd, L=Falls Church, S=VA, PostalCode=22042, C=US

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
00FA38555401DF446270E5F1CB64D3E263

File PE Metadata
Compilation timestamp:
5/31/2011 9:11:11 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:o002ACfwImqDidLUj8iGHsE1jLtUWzF/CaPd2FHIzlxPrmlVRqAPpxCX73ti4feY:o0VfwImqudAoiG71HeW/g5IzlEVRqAPG

Entry address:
0xA64B90

Entry point:
60, BE, 00, 70, B9, 00, 8D, BE, 00, A0, 86, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.9112

Packer / compiler:
UPX 2.90LZMA]

Code size:
2.8 MB (2,940,928 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Second Copy

Command:
"C:\Program Files\second copy 8\seccopy.exe"


The file SecCopy.exe has been discovered within the following program.

Second Copy 8  by Centered Systems
www.secondcopy.com
About 6% of users remove it
 
Powered by Should I Remove It?

Scan SecCopy.exe - Powered by Reason Core Security