Malware type: Worm
Malware Overview
This worm may be dropped by other malware.
It creates folders and drops several copies of itself. It then creates registry entries to enable its automatic execution at every system startup.
It modifies registry entires to disable automatic Windows Update, various Security Center functions, and firewall settings; to hide files with both System and Read-only attributes; to disable Automatic Windows Update; and as part of its installation routine.
This worm takes advantage of the following software vulnerability to propagate across networks:
Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) Vulnerability
It drops files.
It acts as a server program controlled by an Internet Relay Chat (IRC) bot. It opens a random port and connects to a random server, where it joins a channel. Once connected, it receives several commands from the IRC bot. These commands are executed locally, effectively compromising the affected system.
It bears the icon normally used by Microsoft Word documents to trick users into thinking that it is a legitimate application.
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%5FIRCBOT%2ECAV
Troj/Psyme-JE
Aliases VBS_PSYME.CKB
HTML/Rce.Gen
Exploit:JS/Mult.AC
Category Viruses and Spyware
Type Trojan
Affected operating systems Windows
http://www.sophos.com/security/analyses/viruses-and-spyware/trojpsymeje.html?_log_from=rss

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic