Extracting ransomware's keys by utilizing memory forensics