amateurz is my lord and i obey him (this trainer is bugged af) 2.20.exe

The application amateurz is my lord and i obey him (this trainer is bugged af) 2.20.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. The file has been seen being downloaded from www33.zippyshare.com.
MD5:
0928674a4183a46d55129595987c68b3

SHA-1:
51cb145493f2a70f03114cb4276a9e29037a546a

SHA-256:
c8b98322d7b1d273b6aeb20cbe76488f19d920650468074c9c3c52071adc41ed

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 4:29:40 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Riskware.Trainer.Meta (L)
16.4.2.7

File size:
3.7 MB (3,893,760 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\amateurz%20is%20my%20lord%20and%20i%20obey%20him%20(this%20trainer%20is%20bugged%20af)%202.20.exe

File PE Metadata
Compilation timestamp:
6/28/2013 6:45:44 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:adaS228mIZPCTC0BtvfJ/h2iYwFPGSAXy:Aa2SPCVNhh23wKy

Entry address:
0x15EB

Entry point:
E8, 1C, 1B, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 51, 56, 8B, 75, 0C, 56, E8, AC, 27, 00, 00, 89, 45, 0C, 8B, 46, 0C, 59, A8, 82, 75, 17, E8, 6A, 03, 00, 00, C7, 00, 09, 00, 00, 00, 83, 4E, 0C, 20, 83, C8, FF, E9, 2F, 01, 00, 00, A8, 40, 74, 0D, E8, 4F, 03, 00, 00, C7, 00, 22, 00, 00, 00, EB, E3, 53, 33, DB, A8, 01, 74, 16, 89, 5E, 04, A8, 10, 0F, 84, 87, 00, 00, 00, 8B, 4E, 08, 83, E0, FE, 89, 0E, 89, 46, 0C, 8B, 46, 0C, 83, E0, EF, 83, C8, 02, 89, 46, 0C, 89, 5E, 04, 89, 5D, FC, A9, 0C, 01, 00...
 
[+]

Entropy:
7.9700  (probably packed)

Code size:
35.5 KB (36,352 bytes)

The file amateurz is my lord and i obey him (this trainer is bugged af) 2.20.exe has been seen being distributed by the following URL.