Trojans are malicious applications that pose themselves as legitimate software in order to trick users to install them. Once on the victim's machine, it may run any number of malicious process to steal vital information or inflict damage to other software.
This trojan has sends ARP requests in order to map the victim network it is installed on. It also has the ability to execute remote code in order to send malware payloads across the network. Infected machines will have their Image File Execution Options altered for many good processes. Running these legitimate processes will run malware payloads.