I understand what the application is claiming to do, but what efforts have been taken to really understand what this software does? Also, why is it listed as a known threat on a security website?

I understand that the 'authorities' see this as not a threat, but what kind of technical evaluation of the applet has been done. Is there a way I could enable it in a safe mode that tracks all operations it takes so that I can personally audit its behavior? I'd be willing to buy software if it exists that could wrap around it to see what its doing. Anything like that out there?

Thank you for looking in to this, I'm hoping to use this as an exercise to learn sometime new.

-chris