► The disappearance of Word menu options relating to the presence of macros
► Encryption or displacement of system areas, such as the Master Boot Record
► Manipulation of the Windows Registry
► The trashing or corruption of legitimate macros as part of the installation of a macro virus