Trojans are malicious applications that pose themselves as legitimate software in order to trick users to install them. Once on the victim's machine, it may run any number of malicious process to steal vital information or inflict damage to other software.
From Trend Micro
This Trojan arrives as a .OCX file. It is usually installed via other malware applications.
pqnelhleyy ac1f1f39 5ab37ad4
As a BHO, it is activated every time Internet Explorer (IE) is loaded. It is able to monitor user activity over the Internet Explorer.
This Trojan modifies the registry to disable multilink capabilities with RAS (Remote Access Service) connections.