For more information on Word macro viruses, see WordMacro/Concept.
WordMacro/Appder consists of three macros. It also contains a destructive activation routine. After 20 infected files, the virus tries to delete the following files:
C:\DOC\*.EXE C:\DOC\*.COM C:\WINDOWS\*.EXE C:\WINDOWS\SYSTEM\*.TTF C:\WINDOWS\SYSTEM\*.FOT
If the virus succeedes, Windows will not boot after this.
WordMacro/Appder contains this text:
Virus - NTTHNTA
WordMacro/Appder has been reported in the wild during 1997.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.