Aliases
Backdoor.Agobot.3.gen, W32/Gaobot.worm.gen, W32.HLLW.Gaobot.gen
Type
Win32 worm
W32/Agobot-AW is a network worm which also allows unauthorised remote access to the computer via IRC channels.
W32/Agobot-AW copies itself to network shares with weak passwords and attempts to spread to computers using the DCOM RPC and the RPC locator vulnerabilities.
These vulnerabilities allow the worm to execute its code on target computers with System level priviledges. For further information on these vulnerabilities and for details on how to protect/patch the computer against such attacks please see Microsoft security bulletins MS03-026 and MS03-001.
W32/Agobot-AW drops a copy of itself to the Windows system32 folder as wincrt32.exe and adds the following registry entries to run itself on system restart:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Config Loader
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\Config Loader
W32/Agobot-AW collects system information and registration keys of popular games that are installed on the computer.
W32/Agobot-AW attempts to terminate various processes related to anti-virus and security software (e.g. SWEEP95.EXE, BLACKICE.EXE and ZONEALARM.EXE).
http://www.sophos.com/virusinfo/analyses/w32agobotaw.html

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic