I ran a Malwarebytes full scan in safe mode and the results are below. However, a few minutes after supposedly cleaning the tdss rootkit and rebooting, Symantec found the Backdoor.Tidserv again just as before.
Malwarebytes' Anti-Malware 1.41
Database version: 3184
Windows 5.1.2600 Service Pack 3 (Safe Mode)
11/16/2009 8:21:56 PM
mbam-log-2009-11-16 (20-21-56).txt
Scan type: Full Scan (C:\|D:\|)
Objects scanned: 256518
Time elapsed: 44 minute(s), 11 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 7
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ttool (Spyware.Zbot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\23557830 (Rogue.Multiple) -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
C:\WINDOWS\9129837.exe (Spyware.Zbot) -> Quarantined and deleted successfully.
C:\WINDOWS\$hf_mig$\KB925902\SP2QFE\user32.dll (Virus.Mariofev) -> Quarantined and deleted successfully.
C:\WINDOWS\$NtServicePackUninstall$\user32.dll (Virus.Mariofev) -> Quarantined and deleted successfully.
C:\WINDOWS\ServicePackFiles\i386\user32.dll (Virus.Mariofev) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdlwsp.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Start Menu\Programs\Security Tool.LNK (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\bnjh.tmp (Trojan.Agent) -> Quarantined and deleted successfully.