Reverse Engineering Behavioural Models by Filtering out Utilities from Execution Traces