| Most of this page uses content from Wikipedia. The original article was at Acid. The page may have contained some inaccurate or outdated information, so please edit it so it contains better information.|
The list of authors can be seen in the page history. As with Malware Wiki, the text of Wikipedia is available under the Creative Common Attribution-ShareAlike 3.0 License.
Remove this template when most of the Wikipedia content has been removed or the Wikipedia information is outnumbered by non-Wikipedia information.
Each time an infected file is executed, Acid infects all of the .EXE files in the current directory. Later, if an infected file is executed, it infects the .COM files in the current directory. Programs infected with Acid will have had the first 792 bytes of the host program overwritten with Acid's own code. There will be no file length increase unless the original host program was smaller than 792 bytes, in which case it will become 792 bytes in length. The program's date and time in the DOS disk directory listing will not be altered. The following text strings are found in infected files:
*.EXE *.COM .. Program too big to fit in memory Acid Virus Legalize ACiD and Pot By: Copyfright Corp-$MZU
Delete the infected files.
- Computer Viruses (A), by Probert Encyclopedia
- Acid virus, by McAfee