Dissecting Destructive Malware and Recovering from Catastrophe