The document presents a method for detecting malware and rootkits using in-memory analysis and machine learning techniques. It outlines a two-phase approach where phase I employs static analysis for anomaly detection in memory artifacts, while phase II utilizes dynamic analysis to accurately classify benign versus malicious code. The objective is to automate the detection process efficiently and effectively, leveraging clustering algorithms and call trace analysis to identify advanced persistent threats in a scalable manner.