The program reports false or exaggerated system security threats on the computer.
The user is then prompted to pay for a full license of the application in order to remove the threats.Installation
When the program is executed, it creates the following registry subkey:
It then modifies the following registry subkey:
It then makes the following HTTP requests:
These requests are in order to download and install further misleading applications. At the time of writing the files downloaded were detected as Unvirex