Chapter 2 – Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts