# A Detailed Analysis Of The Last Version Of REvil Ransomware **[securityscorecard.com/research/a-detailed-analysis-of-the-last-version-of-revil-ransomware](https://securityscorecard.com/research/a-detailed-analysis-of-the-last-version-of-revil-ransomware)** Skip to main content [Security Scorecard](https://securityscorecard.com/) [Request a Demo](https://securityscorecard.com/request-a-demo) [Support](https://support.securityscorecard.com/hc/en-us) [Login](https://platform.securityscorecard.io/#/start) [Contact](https://securityscorecard.com/company/contact-us) [Blog](https://securityscorecard.com/blog) [Languages](https://securityscorecard.com/research/a-detailed-analysis-of-the-last-version-of-revil-ransomware) [English](https://securityscorecard.com/) [Français](https://securityscorecard.com/fr) [日本語](https://securityscorecard.com/jp) [Request a Demo](https://securityscorecard.com/request-a-demo) ----- A Detailed Analysis Of The Last Version Of REvil Ransomware REvil/Sodinokibi ransomware has been active since 2019, with breaks due to law enforcement. The malware comes with an RC4 encrypted configuration, kills a list of targeted processes, and stops some specified services. It also deletes all Volume Shadow Copies using WMI and targets logical drives and network shares. [Download Now](https://securityscorecard.pathfactory.com/cybersecurity/detailed-analysis-revil) Join us in making the world a safer place. [Free Account Sign Up](https://securityscorecard.com/free-account) -----