.Crab Virus

OFFER *Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found.               Spyhunter's EULAPrivacy Policy and more details about Free Remover.


If you have recently had a virus named .Crab virus infect your computer, then your personal data files are most likely currently inaccessible to you because the malware program has encrypted them. In such a case, you’d be asked to pay a ransom in return for a special decryption key which would supposedly set your files free.

.Crab Virus

.Crab Virus Ransomware

How does Ransomware work?

Once a computer gets infected by a Ransomware, the user of the PC will likely not notice anything suspicious going on. Note that viruses like .Crab are extremely stealthy and most of the time there won’t be any overly-noticeable symptoms. Furthermore, bear in mind that even a good antivirus might be unable to spot a Ransomware infection. The reason for that lies in the process used by the malware to render the files inaccessible. We already mentioned that this process is called encryption and what’s special about it is that it isn’t actually an inherently damaging one. In most cases of Ransomware attacks. Pretty much nothing gets initially harmed by the virus. Though the files would get locked, they will remain intact. Because of this, many conventional antivirus programs could fail to recognize the process ran by the virus which would, in turn, leave the infection undetected allowing the Ransomware to continue locking the files that it has targeted until each and every file has been encrypted.

After the encryption has taken place

The second stage of a Ransomware attack is the ransom request that gets generated on the user’s computer after the encryption process has been completed. Typically, the ransom-remanding note gets generated in the form of a notepad file placed on the desktop or inside the directory where the encrypted files are. Within this note, the hackers state their demands in terms of how much money is requested and how the sum needs to be transferred. A typical method of transferring the ransom is by using a cryptocurrency such as BitCoin. This is a very common ransom request since cryptocurrencies are notoriously difficult to track and most hackers are thus able to remain unpunished for their crimes.

When talking about the ransom payment, we ought to note that making the money transfer doesn’t guarantee the restoration of your files. The hackers might or might not send you the needed key and there’s nothing you can do about it if they decide to not send it. Due to this, the payment should usually be regarded as a last resort option rather than the first thing you do once you see that your files have been locked-up. We always advise our visitors to seek alternative solutions to Ransomware infections which is also the reason why we strive to offer such possible alternatives here, on our site. Therefore, if you are currently struggling with .Crab, try out our guide that we have added down below – it includes instructions on how to remove the virus from your PC and there’s also a separate section concerning the decryption process. Though we can’t promise you that those instructions will always be successful, it is certainly preferable if you tried them first, before going for the ransom payment.

You must keep your PC protected!

Obviously, Ransomware is a significant malware threat and it is always better to simply ensure that your machine doesn’t get attacked by such a virus instead of trying to get rid of it and of its consequences afterwards. In order to properly protect your PC system against such or any other type of malware in future, you need to be very careful and vigilant when browsing the Internet as this is the most common sources of such infections.

We strongly advise you to stay away from any websites that do not seem trustworthy since visiting suspicious and questionable web addresses can significantly increase the chance of getting your machine attacked by malware. Another important rule is to never open e-mails or other web messages if you think that they look like spam – distributing Ransomware through online spam messages is another very commonly utilized method. Our next suggestion is to always have a reliable antivirus to protect your system cause it will improve your protection against Trojans. Trojan Horses are commonly used to load Ransomware into PCs that have already been infected by them so keep that in mind. Last but not least, backup any important files that you have on your PC using a separated device that isn’t connected to the computer. This is an extremely effective way of dealing with potential future Ransomware infections since the hacker wouldn’t have any leverage over you that they can use to blackmail you.


Name .Crab
Type Ransomware
Danger Level High (Ransomware is by far the worst threat you can encounter)
Symptoms Increased use of RAM, CPU and HDD space.
Distribution Method Malvertising ads, malicious spam e-mails, Trojan malware used as backdoor, etc.
Data Recovery Tool [banner_table_recovery]
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version. More information about SpyHunter and steps to uninstall.

.Crab Virus Ransomware Removal


.Crab Virus

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

.Crab Virus


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

.Crab Virus

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

.Crab Virus
Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/

Scan Results

Virus Scanner Result
.Crab VirusClamAV
.Crab VirusAVG AV
.Crab VirusMaldet

After you open their folder, end the processes that are infected, then delete their folders. 

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.

.Crab Virus

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

.Crab Virus

If there are suspicious IPs below “Localhost” – write to us in the comments.

Type msconfig in the search field and hit enter. A window will pop-up:

.Crab Virus

Go in Startup —> Uncheck entries that have “Unknown” as Manufacturer.

  • Please note that ransomware may even include a fake Manufacturer name to its process. Make sure you check out every process here is legitimate.

.Crab Virus

Type Regedit in the windows search field and press EnterOnce inside, press CTRL and F together and type the virus’s Name. 

Search for the ransomware  in your registries and delete the entries. Be extremely careful –  you can damage your system if you delete entries not related to the ransomware.

Type each of the following in the Windows Search Field:

  1. %AppData%
  2. %LocalAppData%
  3. %ProgramData%
  4. %WinDir%
  5. %Temp%

Delete everything in Temp. The rest just check out for anything recently added. Remember to leave us a comment if you run into any trouble!

.Crab Virus 

How to Decrypt .Crab files

We have a comprehensive (and daily updated) guide on how to decrypt your files. Check it out here.

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


About the author


Brandon Skies

Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.


  • Try using the instructions from the guide, hopefully this would help you deal with the virus.

  • I have the virus and i followed the guide. But in ny host file there wasent Another ip. And do u still have on the pc if i restert it?

    • If the malware isn’t removed, restarting the PC won’t do anything to remove it. Did you check the Registry Editor for any suspicious entries? Also, have you recently downloaded anything sketchy?

  • hello guys .my laptop attacked by (.CRAB) virus ! is there way to remove completely or must format completely? what should i do ? all my images,files videos all got affected !

    • Try the guide posted on this page and also you might want to visit our special article named How to Decrypt Ransomware. Removing the virus should be possible, but we can’t guarantee that your files can be restored at this moment.

  • I was exposed to this virus, and I tried various methods but failed and finally I reinstalled my windows, but the file that changed to my krab still kept I moved it to my friend’s laptop, can the file be reversed?

    • The first thing we’d advise you to do is try some of the recovery instructions available on our site (in the How to Decrypt Ransomware article).

  • Hello.

    I used Spyhunter 5 to remove GandCrab v5. 0. 4. I still have IPs in my hosts file underneath the local host.

    0. 0. 0. 0 pubads. g. doubleclick. net
    0. 0. 0. 0 securepubads. g. doubleclick. net
    0. 0. 0. 0 www. googletagservices. com
    0. 0. 0. 0 gads. pubmatic. com
    0. 0. 0. 0 ads. pubmatic. com
    0. 0. 0. 0 spclient. wg. spotify. com

    Should I delete these?
    Thank you.

    • Yes, you should most definitely delete these – they are not supposed to be in your Hosts file. Even if the main issue has been dealt with, there is no reason to keep those IP addresses in your Hosts file.

Leave a Comment