Threat Database Adware Professional Convert

Professional Convert

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 512
Threat Level: 20 % (Normal)
Infected Computers: 848
First Seen: January 20, 2026
Last Seen: April 28, 2026
OS(es) Affected: Windows

Registry Details

Professional Convert may create the following registry entry or registry entries:
File name without path
Professional Convert.lnk

Directories

Professional Convert may create the following directory or directories:

%APPDATA%\Microsoft\Windows\Start Menu\Programs\ProfessionalConvert
%localappdata%\ProfessionalConvert

Analysis Report

General information

Family Name: Professional Convert
Signature status: Self Signed

Known Samples

MD5: 3f047a3ca0c38363d44cef8fc60a09b0
SHA1: 928b1a24330ba09c26bd61fd22828728461d6f2d
SHA256: 4E615A58DF50812900F60B29F6084AEB03703B7A4498C67035E0EE6177AE52EF
File Size: 360.36 KB, 360360 bytes
MD5: dba30b896bb9951f52724d46b5cf8d50
SHA1: 900ccf9ed8068f3ef560c77f1812b3b953aa8f44
SHA256: CBB2EBF035B499590E03506608A1501740DD44192C495780EC18BD261489D456
File Size: 9.61 MB, 9614320 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Description Profi Tool Installer
File Version 5.0.7.9
Product Name Profi Tool Installer
Product Version 5.0.7.9

Digital Signatures

Signer Root Status
International Holdings, LLC GlobalSign GCC R45 EV CodeSigning CA 2020 Self Signed

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\installer.7z Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\installer.7z Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\license Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\license Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\licenses.chromium.html Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\licenses.chromium.html Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\loadscreen.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\loadscreen.bmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\version Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\installer\version Synchronize,Write Attributes
Show More
c:\users\user\appdata\local\temp\nse9cd5.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\modern-wizard.bmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\nsdialogs.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\nsis7z.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nse9cd5.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsp9c67.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • AdjustTokenPrivileges

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\928b1a24330ba09c26bd61fd22828728461d6f2d_0000360360.,LiQMAxHB

Trending

Most Viewed

Loading...