Mal/ZAUMem-C is a malware infection, which is a part of a new variation of ZeroAccess malware. Mal/ZAUMem-C might be complicated to detect and uninstall from the attacked PC by many security applications. HPmal/ZAccess-A has persistence if it automatically restarts itself when the computer user logs off and logs back on, or when he/she restarts the PC. That makes Mal/ZAUMem-C more hazardous, as it generally serves the attackers for a longer period of time. But the creators of Mal/ZAUMem-C also use the right-to-left override (RLO) and several other non-printable Unicode characters in both file paths and registry entries to further bypass the detection and uninstallation of the ZeroAccess components. RLO is often used by cybercrooks to cover the extension of malicious .EXE files. Mal/ZAUMem-C adds the files into a new location by using the ACL (Access Control List) trick. Mal/ZAUMem-C creates copies of itself into two locations: the %Program Files% folder, the user's local AppData area. Every copy is located in a folder that seems to be as if it is inserted in a Google software product, using non-printable Unicode characters that make it complicated to detect on some versions of Windows. Mal/ZAUMem-C connects to the peer-to-peeer network and distributes modules that primarily perform click fraud.