Trojans are malicious applications that pose themselves as legitimate software in order to trick users to install them. Once on the victim's machine, it may run any number of malicious process to steal vital information or inflict damage to other software.
From Trend Micro This Trojan arrives as a .OCX file. It is usually installed via other malware applications.
pqnelhleyy 82b98bd5 5399e63a
As a BHO, it is activated every time Internet Explorer (IE) is loaded. It is able to monitor user activity over the Internet Explorer.
This Trojan modifies the registry to disable multilink capabilities with RAS (Remote Access Service) connections.