Whitepaper that discusses viruses that make use of COM interfaces to implement their functionality and how to reverse the binaries.
6bd84f361d4b7a3a4d92217238917f08e6f6a2c74e8d9597f60630d686bbaf8c
© 2024 Packet Storm. All rights reserved.