When prompted by Windows User Account Control, click to allow changes.
Follow the instructions, choosing "Personal Computer" when asked for the device type.
: Files labeled as "cracks" are the most common way for attackers to bypass your existing security and install Trojans.
: If threats are found, click Quarantine to isolate them. You may need to restart your computer to fully remove certain files. Why Avoid "Crack" Keys and Patches?