> Analyzing a Kernel-Mode Rootkit: Part 1