GridinSoft Threat Intelligence

SET284A.tmp threat report

Detected as Trojan.Generic File reputation report
MD5 3a7d194f836f05137323165697717b2a
Latest seen 2024-07-19 23:01:00 (2 years ago)
First seen 2024-07-19 23:01:00 (2 years ago)
Size 25 MB

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Trojan.Generic. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Trojan.Generic
Recommended action
Scan and remove
Last analysis
2024-07-19 23:01:00 (2 years ago)
File hash
3a7d194f836f05137323165697717b2a
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Trojan.Generic.

Timeline

First seen 2024-07-19 23:01:00 (2 years ago); latest analysis 2024-07-19 23:01:00 (2 years ago).

Publisher context

Company metadata: Advanced Micro Devices, Inc.. Product metadata: ATI Radeon Family.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

SET284A.tmp is a Windows file recorded in the ThreatInfo database. It is associated with ATI Radeon Family. The reported company name is Advanced Micro Devices, Inc.. The current detection status is Trojan.Generic, based on the latest analysis from 2024-07-19 23:01:00 (2 years ago).

If SET284A.tmp appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Generic.

Product Name: ATI Radeon Family
Company Name: Advanced Micro Devices, Inc.
MD5: 3a7d194f836f05137323165697717b2a
Size: 25 MB
First Published: 2024-07-19 23:01:00 (2 years ago)
Latest Published: 2024-07-19 23:01:00 (2 years ago)
Status: Trojan.Generic (on last analysis)
Analysis Date: 2024-07-19 23:01:00 (2 years ago)
SET284A.tmp detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

%system%

ThreatInfo has observed SET284A.tmp in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

Windows 10 100.0%

The most common operating system signal for SET284A.tmp is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

SET284A.tmp is identified as pe for 64-bit systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Format pe
Architecture 64-bit
Subsystem Native
Entry point 0x00002120
Image base 0x0000000000010000

PE Sections:

Sections 63
Raw data 26342912

Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.

.text 2310656 bytes · 8.8% of section data
MD5 34d3a47a1db550926213c8d8bbcf9185
_wtext 512 bytes · 0.0% of section data
Uncommon name
MD5 9fa1eb6fcb2f50db0348f8fbf88e8935
.rdata 1534976 bytes · 5.8% of section data
MD5 99914c1ce2ccc3fd1e32b5e695a63338
.data 7635968 bytes · 29.0% of section data
Large raw data
MD5 7017344e357333c646ae0db4f8aefea4
.pdata 370176 bytes · 1.4% of section data
MD5 19e67f6f4c70d22dc56e64b3a333cd47
.gfids 512 bytes · 0.0% of section data
Uncommon name
MD5 927083ef61a4a9f1aabea44ebfbb1b3b
PAGE_COM 515072 bytes · 2.0% of section data
Uncommon name
MD5 c57e808bb93da8a2700cae51e65d3aa1
PAGE 8192 bytes · 0.0% of section data
Uncommon name
MD5 d84f0f8a83812dd5e7e950e0a2dc5014
PAGE_CAI 308736 bytes · 1.2% of section data
Uncommon name
MD5 eba882b4f31bf792dd95c1374b6c4066
PAGE_DAL 2162176 bytes · 8.2% of section data
Uncommon name
MD5 160c904211fa55664856b605e79a2169
PAGE_ISR 33280 bytes · 0.1% of section data
Uncommon name
MD5 ed9ab23563efc16b86b4d91ff2cd6923
PAGEDC40 1024 bytes · 0.0% of section data
Uncommon name
MD5 6ce224013698b4745f2ebb4b11280216
PAGEDC41 1536 bytes · 0.0% of section data
Uncommon name
MD5 eff9f5dde95d4df3bc2410f0b85a2741
PAGEDC50 1024 bytes · 0.0% of section data
Uncommon name
MD5 453d0cdfec5129a40b66e937b724c49f
PAGEDC60 1536 bytes · 0.0% of section data
Uncommon name
MD5 0558140d53e482163a021da2335fe3f9
PAGEDC80 28672 bytes · 0.1% of section data
Uncommon name
MD5 346a47eb033e42ac275230ebc01c3e54
PAGEDC10 16384 bytes · 0.1% of section data
Uncommon name
MD5 6a09d2a0adad34f6c86081eff9e0cedf
PAGEDC11 47104 bytes · 0.2% of section data
Uncommon name
MD5 1e912bbf6886a6beff89087f10ae48e8
PAGEDC11 12288 bytes · 0.0% of section data
Uncommon name
MD5 997a543d8132d035ea3befe88c53b82e
PAGEDC12 16384 bytes · 0.1% of section data
Uncommon name
MD5 fcfc4262587f3a280951a43a69d59a1a
PAGE_PPL 866816 bytes · 3.3% of section data
Uncommon name
MD5 f72d3452751c70d0def1acbbecd8e413
PAGE_CPC 183808 bytes · 0.7% of section data
Uncommon name
MD5 4a209e707ab8163589b3084975b9ac4c
PAGE_CAI 3342336 bytes · 12.7% of section data
Uncommon name
MD5 b82dccf716217780bcb87cda7681a7c8
PAGE 4318208 bytes · 16.4% of section data
Uncommon name
MD5 51b17ce46db279a3c1fba9c31475c041
PAGE_IEG 46592 bytes · 0.2% of section data
Uncommon name
MD5 8c6326a0f7de3b5e62eb4133930fc397
PAGE_ILN 24064 bytes · 0.1% of section data
Uncommon name
MD5 dda956033ed569ad97d395a3b23a1b64
PAGE_IBT 41984 bytes · 0.2% of section data
Uncommon name
MD5 e4c3322a58264447f916de0ed0b70661
PAGE_INI 45056 bytes · 0.2% of section data
Uncommon name
MD5 dbd8fe67296ddb639f6018bd9be27a9c
PAGE_ITN 32256 bytes · 0.1% of section data
Uncommon name
MD5 fac2b4c369b933158297314877c819f5
PAGE_ISI 45568 bytes · 0.2% of section data
Uncommon name
MD5 9d76ed104111718e6602b17200babbea
PAGE_ICI 51200 bytes · 0.2% of section data
Uncommon name
MD5 4d1dd9c3eeeb9b0b527190c8420fdcbe
PAGE_IKV 47616 bytes · 0.2% of section data
Uncommon name
MD5 3d545f8bdc490c97721899e2cd4a2187
PAGE_IIL 22016 bytes · 0.1% of section data
Uncommon name
MD5 80e738db8b3cbe6be1372ae619df581e
PAGE_IVI 55808 bytes · 0.2% of section data
Uncommon name
MD5 097bbdd7409d04b4509cff58569811e9
PAGE_ICZ 53248 bytes · 0.2% of section data
Uncommon name
MD5 70cb6dbbd4986310cf929c60fdd03bcf
PAGE_IGN 37888 bytes · 0.1% of section data
Uncommon name
MD5 910c5fa6338f939827139869092d9858
PAGE_IRV 1024 bytes · 0.0% of section data
Uncommon name
MD5 5d8132b4dc46d914bd0fb4db56421c9f
PAGE_RO 364032 bytes · 1.4% of section data
Uncommon name
MD5 b0f7aaadd46b98bac01c17d8bfb26bd2
PAGE_ISR 16896 bytes · 0.1% of section data
Uncommon name
MD5 7a5e5cc723aed07a584c72190fe03510
PAGE_RW 1316864 bytes · 5.0% of section data
Uncommon name
MD5 0a391ad64c8ffbaacc14f96efe39028a
PAGE_ISR 1024 bytes · 0.0% of section data
Uncommon name
MD5 c4cb8fcf5950d495868fd0463ee6fdc3
PAGEDC11 512 bytes · 0.0% of section data
Uncommon name
MD5 2af5eb141af5c2b7013534959af7a241
PAGEDC40 512 bytes · 0.0% of section data
Uncommon name
MD5 23faba6c798f0e36b079d60ca3bac509
PAGEDC10 512 bytes · 0.0% of section data
Uncommon name
MD5 215bb1e25359041021e420bf71137d7a
PAGEDC41 512 bytes · 0.0% of section data
Uncommon name
MD5 20e2b259195127d715de724020f5a974
PAGEDC12 1024 bytes · 0.0% of section data
Uncommon name
MD5 8a2b15060c0fcb5754362062adfcbeb3
PAGEDC50 512 bytes · 0.0% of section data
Uncommon name
MD5 f3719eae7f4145170787a75eb0e91872
PAGEDC60 512 bytes · 0.0% of section data
Uncommon name
MD5 4e70a42a048d01579daadde814fed4a2
PAGEDC11 8704 bytes · 0.0% of section data
Uncommon name
MD5 7da716477c3ef67c56ef4319cf84bef7
PAGEDC80 2048 bytes · 0.0% of section data
Uncommon name
MD5 b73a35125ac60d0b49c6d11dab48b3ae
PAGEDC40 512 bytes · 0.0% of section data
Uncommon name
MD5 618aa5d833d2ba9f13fdcccfee8c9dcb
PAGEDC41 512 bytes · 0.0% of section data
Uncommon name
MD5 09a03280ed698b2d943505ae060df3c5
PAGEDC50 512 bytes · 0.0% of section data
Uncommon name
MD5 d9b2739308eda672dd7d82f49452b9ec
PAGEDC60 512 bytes · 0.0% of section data
Uncommon name
MD5 da042f966e056debb50504d84cd2f729
PAGEDC80 512 bytes · 0.0% of section data
Uncommon name
MD5 38ec39c44cfa77cf5d7c2ddd72d2cbac
PAGEDC10 512 bytes · 0.0% of section data
Uncommon name
MD5 59bf2611b25e1960a42fd59dd1b04386
PAGEDC11 512 bytes · 0.0% of section data
Uncommon name
MD5 8e6c836ca0d20e391c15a5c74a9c50a8
PAGEDC11 512 bytes · 0.0% of section data
Uncommon name
MD5 a7ece5edad49ee42fd2311c8b8a73d04
PAGEDC12 512 bytes · 0.0% of section data
Uncommon name
MD5 b621ecd8397371448b39aa75005278a7
PAGE_CPR 35328 bytes · 0.1% of section data
Uncommon name
MD5 9db090eb4807afc1cc8f473ea440ebed
INIT 7168 bytes · 0.0% of section data
Uncommon name
MD5 c1c467dedfa52a91c4dc393831efc3d7
.rsrc 9216 bytes · 0.0% of section data
MD5 e6ffed0f14fe7f1df5e48dcc734c1f61
.reloc 351232 bytes · 1.3% of section data
MD5 c00728b9266c7aad8cd791c69e638870

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

Report conclusion

GridinSoft detects this file as Trojan.Generic

This report identifies SET284A.tmp by MD5 3a7d194f836f05137323165697717b2a. If the same file is present on your device, scan the system and remove the detected object after confirming the hash and location.

Download GridinSoft Anti-Malware Scan the device and confirm whether this exact hash is present. Check this hash on VirusTotal

Recommended next steps

  • Compare the local file MD5 with 3a7d194f836f05137323165697717b2a.
  • Check the file path, publisher, and signature against the details in this report.
  • Run a GridinSoft scan and remove the object if the same hash is found.