Hey gang. I am thinking I have the newer version that rkhunter mentions a few posts back and links to a webroot blog post. Let me show you a copy of a portion of the latest ComboFix log with the catchme information...
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-21 11:15
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
DLCJCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\DLCJtime.dll,RunDLLEntry???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
.
scanning hidden files ...
.
.
c:\windows\$NtUninstallKB6522$:SummaryInformation 0 bytes hidden from API
.
scan completed successfully
hidden files: 1
.
**************************************************************************
I wasn't too concerned about the DLCJtime.dll piece since I found a Dell troubleshooting article referring to issues with the Dell AIO printers. The piece that gives me the impression that this is the newer version that rkhunter linked is the hidden files at c:\windows\$NtUninstallKB6522$. Using normal file/folder options to unhide OS files etc. this still does not show up for me whcih I expected and wouldn't lead me to the proper file store anyway.
Now in regards to the suggestions that have been presented... Flopik referenced the PREVX paper that provided a registry key to look at and unfortunately, I did not see any keys there to fit the description provided unless it's a .NET reference in which case, none of those entries has an image path pointing to \*. Also, as I remember reading further into the article, once the driver runs for the first time, the registry key pointing to the .<driver> isn't needed and is deleted. Since this has run several times I'm sure, I'm well past finding that key anyway. Noting else I've done, including running GMER by itself, has led me to anything that I can see that might point me in the right direction. Since ComboFix runs several utilities in the background, I wonder which one is detecting ZA and it's tcpip corruption. I'm open again for more thoughts and suggestions.
UPDATE: I'm now able to connect via the internet and update software. There were some remnants of a Mcafee installation and the firewall showed to be running in the combofix log. I ran MCPR.exe and that opened up the network connections.