The log from the first scan with MBAR:
Malwarebytes Anti-Rootkit 1.1.0.1009
www.malwarebytes.org
Database version: v2012.11.24.11
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Nellie :: NELLIE-HP [administrator]
25/11/2012 00:26:37
mbar-log-2012-11-25 (00-26-37).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: PUP | PUM | P2P
Objects scanned: 27852
Time elapsed: 14 minute(s), 40 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 2
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\L (Backdoor.0Access) -> Delete on reboot. [c7ba2a8f72ebae881b664db324dc7d83]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\U (Backdoor.0Access) -> Delete on reboot. [87fa6950114cb185463cd32dbb4544bc]
Files Detected: 12
C:\Windows\System32\services.exe (Rootkit.0Access) -> Delete on reboot. [50bea589f7d7958bdd2528a8f69d05cc]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\@ (Backdoor.0Access) -> Delete on reboot. [087900b90f4ed75f82d80df333cd5aa6]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\L\00000004.@ (Backdoor.0Access) -> Delete on reboot. [00818435a9b4f541ce8ad828709002fe]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\U\00000004.@ (Backdoor.0Access) -> Delete on reboot. [4d343f7a88d5ad89fc5b16ea59a7a35d]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\U\00000008.@ (Trojan.Dropper.BCMiner) -> Delete on reboot. [c0c1407964f9db5b54f2ac0605fb8080]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\U\000000cb.@ (Backdoor.0Access) -> Delete on reboot. [a6dba81108553105ef68a35df20e3ec2]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\U\80000000.@ (Backdoor.0Access) -> Delete on reboot. [bfc2784185d849eda3b41be50cf47f81]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\U\80000032.@ (Rootkit.0Access) -> Delete on reboot. [255c81384d107bbbf0ac9734867ab24e]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\U\80000064.@ (Backdoor.0Access) -> Delete on reboot. [ea971e9b82dbe74f193e2dd3cb358a76]
C:\Windows\assembly\GAC_32\Desktop.ini (Rootkit.0access) -> Delete on reboot. [b4cdc0f9d8856ccab7ec616736ca6799]
C:\Windows\assembly\GAC_64\Desktop.ini (Rootkit.0access) -> Delete on reboot. [324f5267d28bef4782211eaac53b857b]
C:\Windows\Installer\{4c8eeba8-7479-d8e2-4b7f-f4b3ebeb2759}\L\201d3dde (Backdoor.0Access) -> Delete on reboot. [c7ba2a8f72ebae881b664db324dc7d83]
(end)