GridinSoft Threat Intelligence
SET284A.tmp threat report
GridinSoft Anti-Malware detection
Detected by GridinSoft before you download
The current ThreatInfo record shows this exact file hash detected as Trojan.Generic. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.
- Detection name
- Trojan.Generic
- Recommended action
- Scan and remove
- Last analysis
- 2024-07-19 23:01:00 (2 years ago)
- File hash
- 3a7d194f836f05137323165697717b2a
Why it matters
Why GridinSoft flags this file
GridinSoft identifies the sample as Trojan.Generic.
First seen 2024-07-19 23:01:00 (2 years ago); latest analysis 2024-07-19 23:01:00 (2 years ago).
Company metadata: Advanced Micro Devices, Inc.. Product metadata: ATI Radeon Family.
ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.
Recommended action
What to do next
- Compare the MD5 above with the file found on the device.
- Check whether the file appears in the observed locations or under one of the alternate names.
- Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.
File context
SET284A.tmp is a Windows file recorded in the ThreatInfo database. It is associated with ATI Radeon Family. The reported company name is Advanced Micro Devices, Inc.. The current detection status is Trojan.Generic, based on the latest analysis from 2024-07-19 23:01:00 (2 years ago).
If SET284A.tmp appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Generic.
File Details
| Product Name: | ATI Radeon Family |
| Company Name: | Advanced Micro Devices, Inc. |
| MD5: | 3a7d194f836f05137323165697717b2a |
| Size: | 25 MB |
| First Published: | 2024-07-19 23:01:00 (2 years ago) |
| Latest Published: | 2024-07-19 23:01:00 (2 years ago) |
| Status: | Trojan.Generic (on last analysis) | |
| Analysis Date: | 2024-07-19 23:01:00 (2 years ago) |
Detection screenshot
The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.
Common Places:
| %system% |
ThreatInfo has observed SET284A.tmp in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.
Geographic signal
Observed country distribution
ThreatInfo has seen SET284A.tmp across 1 countries. Use this signal to compare local evidence with where the sample is most often reported.
The strongest geographic signal for this file is Argentina with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.
OS Version:
The most common operating system signal for SET284A.tmp is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.
Analysis
SET284A.tmp is identified as pe for 64-bit systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.
PE Sections:
Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.
34d3a47a1db550926213c8d8bbcf9185
9fa1eb6fcb2f50db0348f8fbf88e8935
99914c1ce2ccc3fd1e32b5e695a63338
7017344e357333c646ae0db4f8aefea4
19e67f6f4c70d22dc56e64b3a333cd47
927083ef61a4a9f1aabea44ebfbb1b3b
c57e808bb93da8a2700cae51e65d3aa1
d84f0f8a83812dd5e7e950e0a2dc5014
eba882b4f31bf792dd95c1374b6c4066
160c904211fa55664856b605e79a2169
ed9ab23563efc16b86b4d91ff2cd6923
6ce224013698b4745f2ebb4b11280216
eff9f5dde95d4df3bc2410f0b85a2741
453d0cdfec5129a40b66e937b724c49f
0558140d53e482163a021da2335fe3f9
346a47eb033e42ac275230ebc01c3e54
6a09d2a0adad34f6c86081eff9e0cedf
1e912bbf6886a6beff89087f10ae48e8
997a543d8132d035ea3befe88c53b82e
fcfc4262587f3a280951a43a69d59a1a
f72d3452751c70d0def1acbbecd8e413
4a209e707ab8163589b3084975b9ac4c
b82dccf716217780bcb87cda7681a7c8
51b17ce46db279a3c1fba9c31475c041
8c6326a0f7de3b5e62eb4133930fc397
dda956033ed569ad97d395a3b23a1b64
e4c3322a58264447f916de0ed0b70661
dbd8fe67296ddb639f6018bd9be27a9c
fac2b4c369b933158297314877c819f5
9d76ed104111718e6602b17200babbea
4d1dd9c3eeeb9b0b527190c8420fdcbe
3d545f8bdc490c97721899e2cd4a2187
80e738db8b3cbe6be1372ae619df581e
097bbdd7409d04b4509cff58569811e9
70cb6dbbd4986310cf929c60fdd03bcf
910c5fa6338f939827139869092d9858
5d8132b4dc46d914bd0fb4db56421c9f
b0f7aaadd46b98bac01c17d8bfb26bd2
7a5e5cc723aed07a584c72190fe03510
0a391ad64c8ffbaacc14f96efe39028a
c4cb8fcf5950d495868fd0463ee6fdc3
2af5eb141af5c2b7013534959af7a241
23faba6c798f0e36b079d60ca3bac509
215bb1e25359041021e420bf71137d7a
20e2b259195127d715de724020f5a974
8a2b15060c0fcb5754362062adfcbeb3
f3719eae7f4145170787a75eb0e91872
4e70a42a048d01579daadde814fed4a2
7da716477c3ef67c56ef4319cf84bef7
b73a35125ac60d0b49c6d11dab48b3ae
618aa5d833d2ba9f13fdcccfee8c9dcb
09a03280ed698b2d943505ae060df3c5
d9b2739308eda672dd7d82f49452b9ec
da042f966e056debb50504d84cd2f729
38ec39c44cfa77cf5d7c2ddd72d2cbac
59bf2611b25e1960a42fd59dd1b04386
8e6c836ca0d20e391c15a5c74a9c50a8
a7ece5edad49ee42fd2311c8b8a73d04
b621ecd8397371448b39aa75005278a7
9db090eb4807afc1cc8f473ea440ebed
c1c467dedfa52a91c4dc393831efc3d7
e6ffed0f14fe7f1df5e48dcc734c1f61
c00728b9266c7aad8cd791c69e638870
PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.
Report conclusion
GridinSoft detects this file as Trojan.Generic
This report identifies SET284A.tmp by MD5 3a7d194f836f05137323165697717b2a. If the same file is present on your device, scan the system and remove the detected object after confirming the hash and location.