Normalization and Application of Detection Rules for Attack Techniques based on Memory Artifacts