About The Project Continuing from my Malware Analysis Pipeline project, I have been spending some time tearing apart samples trying to get better at malware analysis. Doing so, I run across files that I’ve never heard of before. Obviously, Google is the first stop during the triage period of an unknown function call/DLL, etc… However, what if the DLL dropped was a modified version of a legitimate application? This is where the NSRL comes into play.