Thanks. This is unusual SpyEye like bot.
It stores itself under %Program Files% folder and runs through autostart folder in Start menu. Bot payload dll named "hooker.dll" injected in memory of running processes.
When started bot spawned two IE copies and Windows Firewall blocked their activity.
Stuff from hooker.dll
{%08X-%04X-%04X-%04X-%08X%04X} ntdll.dll NtShutdownSystem kernel32.dll GetNativeSystemInfo
GetProductInfo SeDebugPrivilege SeShutdownPrivilege SeBackupPrivilege SeRestorePrivilege PROCESSOR_IDENTIFIER
HARDWARE\DESCRIPTION\System SOFTWARE\Microsoft\Windows\CurrentVersion SystemBiosVersion ProductId :///:
POSTGETHTTP/*.*
Host:{*}
Referer:{*}
/GET /%s HTTP/1.1
Host: %s
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Accept: text/html, application/xml;q=0.9, application/xhtml+xml;q=0.9, image/png, image/jpeg, image/gif, image/x-xbitmap, *\*;q=0.1
Accept-Charset: utf-8, utf-16, iso-8859-1;q=0.6, *;q=0.1
Pragma: no-cache
Connection: close
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: max-age=0
Pragma: no-cache
Connection: Keep-Alive
Content-Type: text/html
Location: Date: Last-Modified: ddd',' dd MMM yyyy hh':'mm':'ss GMT ntdll.dll ZwQuerySystemInformation
ZwQueryInformationProcess ZwQueryInformationThread LdrLoadDll LdrGetDllHandle LdrGetProcedureAddress
RtlInitUnicodeString RtlUnicodeStringToAnsiString RtlFreeAnsiString RtlInitString RtlAnsiStringToUnicodeString
RtlFreeUnicodeString ZwQueueApcThread ZwTerminateProcess ZwResumeThread ZwProtectVirtualMemory
RtlCreateUserThread ZwClose kernel32.dll ExitThread ExitProcess r e p l a c e k e y w o r d s r e f e r e r u r l
b l a c k l i s t w h i t e l i s t d n s c h a n g e r a l l u n i q A S C I I U T F 8 U N I C O D E { k e y w o r d } < * >
ntdll.dll LdrLoadDll ZwQueryDirectoryFile dnsapi.dll DnsQuery_A DnsQuery_W DnsQuery_UTF8 ws2_32.dll send
sendto recv recvfrom WSASend WSASendTo WSARecv WSARecvFrom closesocket {4F6F3382-2928-8E14-74D2-1A9D1CD12BCC}