Gstatic Generate 204 Conectivitycheck “Virus” Removal (Oct. 2018 Update)


How irritating is this problem? (3 votes, average: 5.00)
Loading...

This page aims to help you remove  Gstatic Generate 204 Conectivitycheck “Virus”. Our removal instructions work for Chrome, Firefox and Internet Explorer, as well as every version of Windows.

If you are faced with a software component called Conectivitycheck Gstatic Generate 204 and it is currently messing with your browser (be it Chrome, Edge, IE, Firefox or any other), then know that you are not alone and that this issue is actually relatively easy to deal with. Browser hijackers such as this one are actually really common and a lot of users have them on their computers (some, even without knowing it). The main problem with such applications is that they are incredibly intrusive – they generate endless streams of ads, banners and page redirects inside the user’s browser and also try to impose unwanted changes to the browsing program in order to further push their advertising agendas. Some of the more common examples of changes to the browser are replaced starting page, search engine and new-tab page as well as an added new toolbar or some other unneeded browser buttons and tools. Now, some of you might not see this as too bad but keep in mind that most of those changes would hardly benefit you in any way and are much more likely to ruin your online experience by making your browser much less effective and optimized. All in all, if you have Conectivitycheck Gstatic Generate 204 or some other similar hijacker component on your browser, you’d most likely want to get rid of it as soon as you can. The good news here is that this isn’t actually such a difficult task to complete. Though irritating and invasive, most hijackers can be uninstalled with relative ease provided that you know where to look for them inside your system. There are several things that you’d need to complete before you can be sure that the pesky app is no longer in your system and we will show you the exact steps down below, in our removal guide for the Conectivitycheck Gstatic Generate 204 hijacker. For your convenience, we have also included a recommended and trusted removal tool that you can also use as additional help for the removal of the hijacker especially if you don’t feel like going with the manual method from the guide. Regardless of what option you choose, just make sure that you eradicate the hijacker – it could hardly provide you with any actual beneficial feature and at the same time it is likely going to greatly decrease the quality of the time you spend online surfing the Internet from your main browser. To learn more about the potential hijacker-related issues you might experience with Conectivitycheck Gstatic Generate 204 and also how you can keep such apps away from your machine in future, stay with us throughout the remainder of this write-up.

Conectivitycheck Gstatic Generate 204 “Virus” Removal

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
ClamAV
AVG AV
Maldet

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Step3

Hold together the Start Key and R. Type appwiz.cpl –> OK.

appwiz

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:

msconfig_opt

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

Step4

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.

DNS

Step5

  • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).

browser-hijacker-taskbar-properties

Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove Conectivitycheck Gstatic Generate 204 from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove Conectivitycheck Gstatic Generate 204 from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove Conectivitycheck Gstatic Generate 204 from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.

Step6

Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Conectivitycheck Gstatic Generate 204 “Virus”-related dangers

Real virus threats like Ransomware, Trojan Horses and Spyware are certainly much more dangerous than a mere browser hijacker like Conectivitycheck Gstatic Generate 204 “Vrus”. One thing to note here is that most browser-redirecting/hijacking apps like the one we are focusing on here have no malicious code in them and wouldn’t actually harm you. That said, there are still certain risks that you should be aware of. The various redirects and ads are one of them – you shouldn’t trust the random ads, banners, blinking boxes and sketchy pages you might get redirected to by the hijacker. Though most of them would probably be safe and harmless, you can never be too sure. It’s perfectly possible that some advert might actually be a hidden link to some questionable or maybe even illegal website with dangerous contents that might threaten the safety of your PC. If you don’t want to expose your computer to insidious and noxious malware hazards such as Trojans, Worms and Ransomware and risk the security of your system, we advise you to keep your distance from any content that the hijacker app might put on your screen. The best thing you can do is simply eradicate Conectivitycheck Gstatic Generate 204 “Virus” using the instructions from this page or the removal tool from the guide (or both).

Hijackers and software bundles

Most users seem to get hijacker/page-redirecting software installed on their machines via file-bundles. This is when an additional software element is put inside the installer of some program – the user is normally able to opt out of the installation of the added element but most customers do not pay enough attention to the different options in the setup manager and they do not leave out the bundled app. This is “trick” is very widely-used by hijacker developers. Normally, the bundled component is opted-in by default under the Quick setup configuration and the user would need to access the Custom setup menu in order to prohibit the installation of the added app. The majority of people do not go out of their way to do that which is what gets them hijackers like Conectivitycheck Gstatic Generate 204 “virus”. However, now that you know about this distribution technique of unwanted software, you will remember to check the Custom menu the next time you are about to install some new program on your PC and uncheck anything you see in that menu that might be a hijacker or some other potentially unwanted piece of software.

Name Gstatic 
Type  Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms  If a hijacker is on your PC, the your browser is likely to start behaving in some weird and unusual way.
Distribution Method Program bundles, spam, torrents, pirated software, web ads, etc.
Detection Tool

Leave a Comment