Attackers use STRunner to expolite the code
It is an ActiveX control to display multimedia content for online tutorials. Basically it reside in ActiveX control named iestm32.dll. But many Antivirus can detect as a trojan.This ActiveX control can be identified by CLSID: {0B72CCA4-5F11-11D0-9CB5-0000C0EC9FDB}. But may hacker can use to attack the user of internet explorer application.
Learn2 corporation is used STRunner ActiveX
STRunner ActiveX Control Multiple Buffer Overflow Vulnerabilities. It works as ActiveX control to the remote Windows host to multiple buffer overflow attacks.
Learn2 corporation is used STRunner ActiveX with various online tutorials. It will directly installed to the remote host. It affected unspecified stack buffer overflows.