Hi Asyn,

And good. The use of Yoda’s Crypter here or of any cryptor generally indicates one of two things -
that a malware author is trying to hide the contents of his executable, or someone worried about intellectual property is trying to hide the contents of his executable…
See the scan at VT:

Magic: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
TrID:
UPX compressed Win32 Executable (43.8%)[lb]Win32 EXE Yoda’s Crypter (38.1%)[lb]Win32 Executable Generic (12.2%)[lb]Generic Win/DOS Executable (2.8%)[lb]DOS Executable Generic (2.8%)
sigcheck:
publisher…: n/a[lb]copyright…: n/a[lb]product…: n/a[lb]description…: n/a[lb]original name: n/a[lb]internal name: n/a[lb]file version.: n/a[lb]comments…: n/a[lb]signers…: -[lb]signing date.: -[lb]verified…: Unsigned[lb]
PEiD: UPX 2.90 [LZMA] → Markus Oberhumer, Laszlo Molnar & John Reiser
packers (Kaspersky): PE_Patch.UPX, UPX
PEInfo: PE structure information

polonus