This article aims to show you how to remove the .crypton Gryphon Ransomware virus variant from your computer and how to restore files encrypted by it.
!## DECRYPT FILES ##!.txt and .crypton encrypted files are the primary signs of presence of the next variant of Gryphon ransomware virus on your computer. The ransomware infection aims to use an advanced encryption algorithm to render the documents, audio files, videos plus other important objects on your computer no longer to be opened. The virus then adds the [gladius_rectus@aol.com] e-mail and the .crypton extension as a file suffix to the encoded object. If your computer has been infected by this virus, do not obey the demands of the ransom note to pay a ransom to get the files back and read this article to learn how to remove .crypton file ransomware and restore encrypted files.
Threat Summary
Name | Gryphon Ransomware |
Type | Ransomware |
Short Description | New version of Gryphon Ransomware. Encrypts files on your computer after which gives 48 hours to the victim of the virus to pay a hefty ransom. |
Symptoms | Your valuable files become inaccessible and are renamed with the extension .crypton. For their decryption a ransom note appears on the PC screen, named !## DECRYPT FILES ##!.txt and demands a ransom payment. |
Distribution Method | Spam Emails, Email Attachments, Fake Setups |
Detection Tool |
See If Your System Has Been Affected by malware
Download
Malware Removal Tool
|
User Experience | Join Our Forum to Discuss Gryphon Ransomware. |
Data Recovery Tool | Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive. |
How Does .crypton Gryphon Ransomware Spread
Similar to the previous version of this ransomware virus, using the .gryphon file extension, the newer .crypton variant may spread in a multitude of ways, the primary of which is by e-mail. The way the scheme works is that you may receive a message with a blank content. The messages that were reported to carry the infection file of .crypton Gryphon variant have .zip archives in which a malicous .JS (JavaScript) file is used for the infection process. The .zip files have the following name:
→ EMAIL_{Unique Number Here}_{Recipient Info Here}.zip
Once the victim extracts the .js file it will appear with a random name. As soon as it has been activated, the .JS file begins to connect to a third-party host with the following IP address:
→ 119.28.78.131 via port 80
Domain name: scenetavern(dot)win or hallvilla(dot)win
After the connection has been established, the malware uses port 80 to download the malicious payload on the infected computer. The payload may consist of multiple malicious files located in the following Windows folders:
- %AppData%
- %Local%
- %LocalLow%
- %Temp%
Gryphon Ransomware (.crypton) – Analysis
As soon as the malicious files of this variant of Gryphon ransomware have been dropped on your computer, they may trigger a temporary system freeze, during which the Gryphon ransomware virus obtains administrative permissions.
Initially, the Grypon Ransomware .crypton variant may attack the Windows Registry Editor. In it, the virus may create a Windows Registry value string in the following registry sub-key:
→ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
In addition to this, similar to the .gryphon file variant, the ransomware virus has the one and only purpose of making it’s presence known. This is why it drops a ransom note file, named !## DECRYPT FILES ##!.txt, which has the following content:
GRYPHON RANSOMWARE
Your documents, photos, databases and other important files have been encrypted
cryptographically strong, without the original key recovery is impossible!
To decrypt your files you need to buy the special software – “GRYPHON DECRYPTER”
Using another tools could corrupt your files, in case of using third party
software we dont give guarantees that full recovery is possible so use it on
your own risk.
If you want to restore files, write us to the e-mail: gladius_rectus@aol.com
In subject line write “encryption” and attach your ID in body of your message
also attach to email 3 crypted files. (files have to be less than 2 MB)
It is in your interest to respond as soon as possible to ensure the restoration
of your files, because we wont keep your decryption keys at our server more than
one week in interest of our security.
Only in case you do not receive a response from the first email address
withit 48 hours, please use this alternative email adress: gladius_rectus@aol.com
Your personal identification number:
In addition to those modifications, the .crypton Gryphon Ransomware variant may also delete the shadow volume copies of the infected machine by executing the following command in the background:
→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
In addition to this, the malware may temporary freeze your computer after which begin to encrypt files.
Gryphon Ransomware – Encryption Process
Regarding the encryption of file, Gryphon Ransomware does not mess around. The virus aims to append AES encryption algorithm on multiple file types, that are reported to possibly be the following:
→ .1c, .3fr, .accdb, .ai, .arw, .bac, .bay, .bmp, .cdr, .cer, .cfg, .config, .cr2, .crt, .crw, .css, .csv, .db, .dbf, .dcr, .der, .dng, .doc, .docm, .docx, .dwg, .dxf, .dxg, .eps, .erf, .gif, .htm, .html, .indd, .iso, .jpe, .jpeg, .jpg, .kdc, .lnk, .mdb, .mdf, .mef, .mk, .mp3, .mp4, .mrw, .nef, .nrw, .odb, .ode, .odm, .odp, .ods, .odt, .orf, .p12, .p7b, .p7c, .pdd, .pdf, .pef, .pem, .pfx, .php, .png, .ppt, .pptm, .pptx, .psd, .pst, .ptx, .r3d, .rar, .raw, .rtf, .rw2, .rwl, .sql, .sr2, .srf, .srw, .tif, .wb2, .wma, .wpd, .wps, .x3f, .xlk, .xls, .xlsb, .xlsm, .xlsx, .zip
If the ransomware detects that some of it’s pre-selected file types are present on your computer, the virus may begin to replace not the whole file, but only portion of the file it targets. This portion is usually a segment of data in the file header or blocks of data within the file itself. After the encryption process is completed, the files begin to appear with the .crypton file extension, which can make the virus easily confusable with Crypton ransomware, which it has nothing to do with. The files assume the following appearance after your computer has been attacked by the .crypton variant of Gryphon Ransomware:
Remove Gryphon Ransomware and Restore .crypton Encrypted Files
Before beginning the removal process of this variant of Gryphon ransomware, we urge you to back your files up either on a flash drive or other external drive or online. Then, you can safely proceed with the removal process. Even though you can follow the manual instructions below, experts strongly advise to automatically remove Gryphon Ransomware with a malware-specific removal software. This will safely remove all the objects and revert the settings changed by this malware on your computer system.
For the recovery of your files, we have suggested multiple methods by which you could try and recover as many files as you can without having to pay the ransom. They are located in step “2. Restore files encrypted by Gryphon” below. The methods may not be 100% guarantee you will be able to recover your
- Guide 1: How to Remove Gryphon Ransomware from Windows.
- Guide 2: Get rid of Gryphon Ransomware from Mac OS X.
- Guide 3: Remove Gryphon Ransomware from Google Chrome.
- Guide 4: Erase Gryphon Ransomware from Mozilla Firefox.
- Guide 5: Uninstall Gryphon Ransomware from Microsoft Edge.
- Guide 6: Remove Gryphon Ransomware from Safari.
- Guide 7: Eliminate Gryphon Ransomware from Internet Explorer.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
How to Remove Gryphon Ransomware from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove Gryphon Ransomware





Step 2: Uninstall Gryphon Ransomware and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:



Step 3: Clean any registries, created by Gryphon Ransomware on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by Gryphon Ransomware there. This can happen by following the steps underneath:



Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Get rid of Gryphon Ransomware from Mac OS X.
Step 1: Uninstall Gryphon Ransomware and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove Gryphon Ransomware via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
→ ~/Library/LaunchAgents
/Library/LaunchDaemons
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove Gryphon Ransomware files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as Gryphon Ransomware, the recommended way of eliminating the threat is by using an anti-malware program. SpyHunter for Mac offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Remove Gryphon Ransomware from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Erase Gryphon Ransomware from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Uninstall Gryphon Ransomware from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Remove Gryphon Ransomware from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the Gryphon Ransomware will be removed.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Eliminate Gryphon Ransomware from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.