Category :


Type :


Aliases :

Bomber, Commander Bomber


Bomber is a complicated virus, which is not known to be in the wild. It stays resident in memory and infects COM files when they are executed.

Bomber contains the following unencrypted text strings:


Bomber inserts its code in the middle of the host file and builds a complicated series of branching commands to transfer the flow of the program to the virus code, which is unencrypted. The detection of such virus would force some scanners to scan the whole file from the beginning to the end - which would be enough to make them unusably slow.

Bomber contains routines which generate random code, which are inserted into random positions in the host file. These fragments are linked by a series of complicated branching commands. Almost all legal 80x86 instructions are used in these code fragments, making Bomber a difficult virus to detect efficiently.

One_Half virus uses a similar infection method.


Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details