Whitepaper that discusses viruses that make use of COM interfaces to implement their functionality and how to reverse the binaries.
You can download it from the following link: https://packetstormsecurity.com/files/download/125082/reversing-callbacks.pdf
Source: https://packetstormsecurity.com/files/125082/Reversing-Encrypted-Callbacks-And-COM-Interfaces.html

