Applying Memory Forensics to Rootkit Detection