GridinSoft Threat Intelligence

SETCF63.tmp threat report

Detected as Trojan.Generic File reputation report
MD5 81a28ec976225525cbe1aa7c755b634e
Latest seen 2023-05-05 23:15:51 (3 years ago)
First seen 2023-05-05 23:15:48 (3 years ago)
Size 20 MB

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Trojan.Generic. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Trojan.Generic
Recommended action
Scan and remove
Last analysis
2023-05-05 23:15:51 (3 years ago)
File hash
81a28ec976225525cbe1aa7c755b634e
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Trojan.Generic.

Timeline

First seen 2023-05-05 23:15:48 (3 years ago); latest analysis 2023-05-05 23:15:51 (3 years ago).

Publisher context

Company metadata: Advanced Micro Devices, Inc.. Product metadata: ATI Radeon Family.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

SETCF63.tmp is a Windows file recorded in the ThreatInfo database. It is associated with ATI Radeon Family. The reported company name is Advanced Micro Devices, Inc.. The current detection status is Trojan.Generic, based on the latest analysis from 2023-05-05 23:15:51 (3 years ago).

If SETCF63.tmp appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Generic.

Product Name: ATI Radeon Family
Company Name: Advanced Micro Devices, Inc.
MD5: 81a28ec976225525cbe1aa7c755b634e
Size: 20 MB
First Published: 2023-05-05 23:15:48 (3 years ago)
Latest Published: 2023-05-05 23:15:51 (3 years ago)
Status: Trojan.Generic (on last analysis)
Analysis Date: 2023-05-05 23:15:51 (3 years ago)
SETCF63.tmp detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

%system%

ThreatInfo has observed SETCF63.tmp in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

Windows 10 100.0%

The most common operating system signal for SETCF63.tmp is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

SETCF63.tmp is identified as pe for 64-bit systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Format pe
Architecture 64-bit
Subsystem Native
Entry point 0x00002090
Image base 0x0000000000010000

PE Sections:

Sections 55
Raw data 21634560

Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.

.text 2078720 bytes · 9.6% of section data
MD5 b3166822271636a9d190867efd509e5b
_wtext 512 bytes · 0.0% of section data
Uncommon name
MD5 9a90b9045a179ecdc24cebf59caa71fb
.rdata 1324544 bytes · 6.1% of section data
MD5 6b7704f5ecf7045fb862afda045fbd95
.data 6327808 bytes · 29.2% of section data
Large raw data
MD5 792ab774debc42aef72243b703ffddf0
.pdata 341504 bytes · 1.6% of section data
MD5 e2b5b5f819413ac8fe81f44d2bb2a224
.gfids 512 bytes · 0.0% of section data
Uncommon name
MD5 4a5ce7150e6c0546fcfa7b0b98c05b3b
PAGE_COM 494080 bytes · 2.3% of section data
Uncommon name
MD5 f70ae6287c00981ce660d80a964f43eb
PAGE 8192 bytes · 0.0% of section data
Uncommon name
MD5 e07d935e9a8876d74c6b499b5caa3c62
PAGE_CAI 274944 bytes · 1.3% of section data
Uncommon name
MD5 c3d8cc4ac7eda5f73cc1471c60b13d35
PAGE_DAL 2016768 bytes · 9.3% of section data
Uncommon name
MD5 d97953730e8983b7a0c0dac00b6b2c3a
PAGE_ISR 19456 bytes · 0.1% of section data
Uncommon name
MD5 96ab467c545e14cf4dc925b66ace430b
PAGEDC40 1024 bytes · 0.0% of section data
Uncommon name
MD5 7754bd4203c52e8681643b7667cd7fec
PAGEDC50 1024 bytes · 0.0% of section data
Uncommon name
MD5 099b3030d6c11b6fc3716de5d56c473e
PAGEDC60 1536 bytes · 0.0% of section data
Uncommon name
MD5 cf52814689be9f6db85ea803656fe714
PAGEDC80 28160 bytes · 0.1% of section data
Uncommon name
MD5 1776620c43f5fc054cfbb1cf712072a5
PAGEDC10 15872 bytes · 0.1% of section data
Uncommon name
MD5 24beba5e3a333706b16b432a369f8c20
PAGEDC11 46592 bytes · 0.2% of section data
Uncommon name
MD5 6decfe146886dab567befd1bf5fc1427
PAGEDC11 26112 bytes · 0.1% of section data
Uncommon name
MD5 d355c2adb93447c979bfeefd1e543453
PAGE_PPL 783360 bytes · 3.6% of section data
Uncommon name
MD5 2c98f0cbff094def4958cf586a72492a
PAGE_CPC 160768 bytes · 0.7% of section data
Uncommon name
MD5 ade72cf8a9c08f63148ed4a5e318791e
PAGE_CAI 1970176 bytes · 9.1% of section data
Uncommon name
MD5 3501f49dea44abdd3b35dbe143d888c3
PAGE 3935232 bytes · 18.2% of section data
Uncommon name
MD5 462a911f1af4b289d40c4671624bc926
PAGE_IEG 34816 bytes · 0.2% of section data
Uncommon name
MD5 1bec04a0230a0081aec3ed6ac20c1d00
PAGE_ILN 18432 bytes · 0.1% of section data
Uncommon name
MD5 0521ac5b31c7efc117406ecd556d0993
PAGE_IBT 31744 bytes · 0.1% of section data
Uncommon name
MD5 86228537af41e2135b3f780df80ee8bc
PAGE_INI 34304 bytes · 0.2% of section data
Uncommon name
MD5 4566e24705adb9bfbccb19d1f2469d95
PAGE_ITN 24576 bytes · 0.1% of section data
Uncommon name
MD5 226cb4dce1476faaf73beef3ffa8556f
PAGE_ISI 34304 bytes · 0.2% of section data
Uncommon name
MD5 a3d0904a4c319f846386a26dfc2c33d8
PAGE_ICI 38400 bytes · 0.2% of section data
Uncommon name
MD5 38fe4ca168b1f8f1f86f3baae5c01fe9
PAGE_IKV 35840 bytes · 0.2% of section data
Uncommon name
MD5 290d089f842282e775c1f2baeabca5ea
PAGE_IIL 16896 bytes · 0.1% of section data
Uncommon name
MD5 0851c09b85dc0f0ed463ff585637fa6a
PAGE_IVI 41984 bytes · 0.2% of section data
Uncommon name
MD5 0fd55b813179e48e47b67f5a275b9828
PAGE_ICZ 40448 bytes · 0.2% of section data
Uncommon name
MD5 c050262a19db22986c5e03f42d14c41e
PAGE_ISR 8192 bytes · 0.0% of section data
Uncommon name
MD5 d56a7aa1fe1b2984ff0487f3fda40e0a
PAGE_RO 340992 bytes · 1.6% of section data
Uncommon name
MD5 7f94f57851f2a951845e2ef665d74194
PAGE_RW 710144 bytes · 3.3% of section data
Uncommon name
MD5 d843bd63c987455d8299b6e1f4c3f349
PAGE_ISR 512 bytes · 0.0% of section data
Uncommon name
MD5 17091318b61d95dbda34d16bb6832ad2
PAGEDC50 512 bytes · 0.0% of section data
Uncommon name
MD5 f2bbb2a17e5e5950f5f1bd79665481d3
PAGEDC60 512 bytes · 0.0% of section data
Uncommon name
MD5 0cc3bf3264516183facb020c9dd6daec
PAGEDC11 8192 bytes · 0.0% of section data
Uncommon name
MD5 ed31f2f542c54af3c725c545d912174a
PAGEDC80 2048 bytes · 0.0% of section data
Uncommon name
MD5 0542ceac55cbd3908d4a4fee782dd558
PAGEDC10 512 bytes · 0.0% of section data
Uncommon name
MD5 0cd6f8c153b2dd2bbbecf94cd2acc0c6
PAGEDC11 1024 bytes · 0.0% of section data
Uncommon name
MD5 c9f65da418a4416c0ca0e0e7c2a2677b
PAGEDC40 512 bytes · 0.0% of section data
Uncommon name
MD5 5f8d8a679cf7334af1c4a69a9645e8e5
PAGEDC40 512 bytes · 0.0% of section data
Uncommon name
MD5 e4e5ce03fd0103e72748ff27af36a6a5
PAGEDC50 512 bytes · 0.0% of section data
Uncommon name
MD5 a7a68b96f38b6291d6d4395eb0bb20df
PAGEDC60 512 bytes · 0.0% of section data
Uncommon name
MD5 d17336ee70cae7a5c96591e22289bac1
PAGEDC80 512 bytes · 0.0% of section data
Uncommon name
MD5 a79d55b34b16c9e756ec8b9153271889
PAGEDC10 512 bytes · 0.0% of section data
Uncommon name
MD5 6f622571f6c063cccfe3f31169673659
PAGEDC11 512 bytes · 0.0% of section data
Uncommon name
MD5 6e05dd277d2db0612a8abd4bf1ac9d19
PAGEDC11 512 bytes · 0.0% of section data
Uncommon name
MD5 c3cae37eb3798f2567426e28fe04fbfd
PAGE_CPR 33280 bytes · 0.2% of section data
Uncommon name
MD5 4999b3a423de7cea4c5ba0ca9cab49f0
INIT 6656 bytes · 0.0% of section data
Uncommon name
MD5 8a5567baf9622fff493a38415d169b90
.rsrc 2560 bytes · 0.0% of section data
MD5 72b0486b26c52035c49de16297ea5c24
.reloc 306688 bytes · 1.4% of section data
MD5 85bf492e2a43f9836e1a725014b8c5e7

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

Report conclusion

GridinSoft detects this file as Trojan.Generic

This report identifies SETCF63.tmp by MD5 81a28ec976225525cbe1aa7c755b634e. If the same file is present on your device, scan the system and remove the detected object after confirming the hash and location.

Download GridinSoft Anti-Malware Scan the device and confirm whether this exact hash is present. Check this hash on VirusTotal

Recommended next steps

  • Compare the local file MD5 with 81a28ec976225525cbe1aa7c755b634e.
  • Check the file path, publisher, and signature against the details in this report.
  • Run a GridinSoft scan and remove the object if the same hash is found.