cuckoo.dll
Named after the parasitic bid that kills other birds and steals their nest, the file houses itself in some of the computer's deepest recesses, tampering with the memory-writing function. It hides itself by allowing files to write correctly, but also writes its own methods to spread its assets in unused space by creating fake cuckoos and moving its own location to other parts of the computer ever few minutes. As it does this, it changes its algorithm by cuckoo's remote destinations. After it has masked itself within the computer well enough, it detects which antivirus is being used and copies the data from its program and sends the information back to a cuckoo master server. The server, which has detected the point at which the original cuckoo began operating, and has received bits of data updating this algorithm locally, then takes in the data collected about the antivirus and runs tests trying to decrypt the program on its own system, using the detection of several syntax languages to detect which is the proper language and to detect what lines in the code protect the local antivirus from being attacked. Once it finds this, it saves the decryption key on the master server and distributes it to every computer running cuckoo with that security system. It then subtly replaces the antivirus with the modified version that makes cuckoo invulnerable to attack. The virus then gathers private information and sends it back to the master server. Additionally, this whole time, it makes efforts discreetly to propagate itself further.