Research into these types of downloads reveals a standard pipeline:

By downloading a modified executable to protect a system, the user is likely installing a backdoor at the kernel level, effectively defeating the purpose of the software.

Creating landing pages that mimic official support forums.