upon installation, the infection disables executable files so that the user cannot use the computer and access the internet. moreover, in order to obtain the victim’s money, the threat starts imitating system scans and displaying fake security alerts, which are also aimed at convincing the user that his or her operating system is compromised by multiple threats.

Please write the text above using proper case.
Upon installation, the infection disables executable files so that the user cannot use the computer and access the Internet. Moreover, in order to obtain the victim’s money, the threat starts imitating system scans and displaying fake security alerts, which are also aimed at convincing the user that his or her operating system is compromised by multiple threats.