I threw this into a virtual machine, it is definitely a trojan. Does it also do what it claims though? I couldn't find out (I might try again later), I was sadly unable to hack it to stop it asking for a "hardware ID" (hardware IDs are actually 8 characters long, though it may still be a hardware hash).
What I do know is that it launched itself 3 times, another .exe, followed by an executable "l2fake.exe", and it then edits explorer.exe (the "window" part of windows) (probably in order to hide itself).