Reverse Engineering the Behaviour of NotPetya Ransomware