Likely Stages of a Ransomware Attack