The domain is owned and operated by Google. This  is used by several programs and applications to interact and obtain data with from one another. For example, if an application or website is using services of Google like Maps, Emails, Analytics, Cloud, and so on, an API is needed to have better collaboration between the application/website and Google services.  With regards to, it is a subdomain that hosts several services and platforms including the Google Cloud Storage.

Is harmful?

As stated, is subdomain that hosts the Google Cloud Storage. This is a file hosting service offering different products that fits the requirement of several online businesses and software developers. The bad thing is, even cyber offenders are taking advantage of on their online fraudulent activities. They are abusing it to deploy malicious programs, phishing scams, spamming, and many other online counterfeiting activities. This is not a new thing and the company is very much aware of it. Google is doing all the necessary measures to control this abuse. In fact, anyone can report a suspected abuse on Google Cloud Planform for any misuse of services that runs on Google infrastructure.

Malware detected on

It is possible that your anti-virus or anti-malware program detects a harmful activities or objects from As stated, there are clients on this server that are abusive. Also, malware that is present on the computer may tend to communicate with the attackers server on Anti-virus application senses this suspicious behavior and the tendency is to block the connection in order to avoid any harm. See sample image below how a real-time protection of security program detects and blocks the outbound connection to

Googleapis Blocked

In the case that computer security application sends an alert about suspicious activities involving, immediately run a complete scan to detect the culprit. Malware could be present on the computer that triggers the suspicious connection to

Threat behavior


Malware, Trojan, or virus running on the computer may redirect affected browser to drive-by-download web site such as Attackers are using this method to spread threats using various web addresses to evade general blocking capability of most security programs. That is why regular updating of your anti-virus and anti-malware program is vital.

Typically, redirects, hijacker, and other relevant threats are embedded on potentially unwanted programs (PUP) or altered legitimate free software like tools, games, multimedia players, and software updates.


If starts to download and install unwanted program onto visitor’s computer, there is really no obvious signs except for sluggish system performance. If your computer is equipped with effective security tool, you might get alerted with a pop-up message stating that computer is under attack by

Browser redirection to and other strange changes on browsers like Internet Explorer, Google Chrome, and Mozilla Firefox are also sign that is initiating an assault on your computer.

How can you remove

To totally remove from the computer and get rid of relevant adware, please execute the procedures as stated on this page. Make sure that you have completely scan the system with suggested malware removal tools and virus scanners.

Step 1 : Scan the computer with Malwarebytes Anti-Malware

1. Download Malwarebytes Anti-Malware from the link below. Save the file on your hard drive.

2. Once the download completes, double-click on the file MBSetup.exe to run the program.

3. Select desired installation package whether for Personal Computer or Work Computer.

4. On next window, click Install button to proceed.

MBAM Default Install

5. Just proceed with the succeeding prompts until it start to execute the installation procedure.

MBAM Installing

6. Installation process will take less than a minute. It should run automatically after completing the setup.

7. When Malwarebytes Anti-Malware interface appears, please select Scan on the menu. The program will check for any available update before proceeding. Do not skip this step. Virus scan may take a while, please wait for the process to finish.


8. When scanning is done, Malwarebytes Anti-Malware will display the list of identified threats. Remove all and restart the computer to finalized the scan process.

Step 2 : Run AdwCleaner to totally remove

1. Download the tool called AdwCleaner from the location stated below.

2. Once you have completed the download, please close all running programs on the computer.

3. Locate the file and double-click on adwcleaner.exe to start running the tool.


4. It searches for presence of harmful programs, plug-ins, add-ons, or any data that were found malicious and linked to You may have to delete each detected item.

5. Once scan is done, the tool may need to reboot your computer to finalize the cleaning process.

6. After reboot, open AdwCleaner once more. Click on Uninstall to remove this program from your computer.

Share & Recommend

About the author

11 thoughts on “”

  1. What’s the point? What if there’s a virus in one of the three software we have to download? Why can’t we just have one software that does all of the functions that the other three do?

  2. Downloaded and paid for the anti malware, but not removed the files it downloaded. I’m unable to uninstall them and the fixes you are recommending above will not remove these, right?

  3. Thank you for that explanation, is there any hazard affecting Linux distributions?

  4. My computer has been blocked.
    Error # DW6VB6
    The following information is being stolen…

    Facebook Login
    >Credit Card Details
    >Email Account Login
    >photos stored on this computer
    Please mail me the removal process.
    My contact no: +8801915130407

  5. I have downloaded TotalAV but I cannot log in now. Each time I get the message that my password is wrong.

  6. I need help ok so this is what happened a few days ago y received a drop box link in messenger and I (stupidly) open it when the bowser opened it took me to an error screen in the URL of the error is:

    This XML.file does not appear to have any style information associated with it. The document tree is:

    User project account problem
    User project billing account not in good standing

    The billing account for project (some numbers i guess is the file code or something ) is disabled in state delinquent

    (the file obviously never showed) The person who I received the message with the link posted 2 days later that it was spam due to a virus but I am not so sure so I wanted to know if this is really the malware of or some other malware or if it’s something else please help me I am kind of paranoiac about it I have some work information on that phone

  7. Followed the above procedures, paid for Malwarebytes software, still getting emails. Any suggestions?

  8. Google is responsible for this domain, how come they do not act on this even if you complain….

  9. This link is for Google Platform Storage services from Google. It’s not installing anything onto your computer. People use Google Platform to store videos, files or whatever, and then gives the user a link. The person shares the link so that someone else can access or view the files. It’s Google’s big data center.

Leave a Comment

Your email address will not be published. Required fields are marked *