Is a virus?

The domain is owned and operated by Google. This is used by several programs and applications to interact with and obtain data from one another. For example, if an application or website is using services from Google like Maps, Emails, Analytics, Cloud, and so on, an API is needed to have better collaboration between the application or website and Google services. With regards to, it is a subdomain that hosts several services and platforms, including Google Cloud Storage.

Is harmful?

As stated, is a subdomain that hosts Google Cloud Storage. This is a file hosting service offering different products that fit the requirements of several online businesses and software developers. The bad thing is, even cyber offenders are taking advantage of for their online fraudulent activities. They are abusing it to deploy malicious programs, phishing scams, spamming, and many other online counterfeiting activities. This is not a new thing, and the company is very aware of it. Google is taking all the necessary measures to control this abuse. In fact, anyone can report suspected abuse on Google Cloud Platform for any misuse of services that run on Google infrastructure.

Malware detected on

It is possible that your anti-virus or anti-malware program detects harmful activities or objects from As stated, there are clients on this server who are abusive. Also, malware that is present on the computer may tend to communicate with the attacker’s server on The anti-virus application senses this suspicious behavior, and the tendency is to block the connection in order to avoid any harm. See the sample image below to see how a real-time security program detects and blocks the outbound connection to

Image of detection

In the event that a computer security application sends an alert about suspicious activities involving, immediately run a complete scan to detect the culprit. Malware could be present on the computer that triggers the suspicious connection to

Threat behavior


Malware, Trojan, or virus running on the computer may redirect the affected browser to a drive-by-download web site such as Attackers are using this method to spread threats using various web addresses to evade the general blocking capability of most security programs. That is why regular updating of your anti-virus and anti-malware programs is vital.

Typically, redirects, hijackers, and other relevant threats are embedded in potentially unwanted programs (PUP) or altered legitimate free software like tools, games, multimedia players, and software updates.


If starts to download and install unwanted programs on visitor’s computers, there are really no obvious signs except for sluggish system performance. If your computer is equipped with an effective security tool, you might get alerted with a pop-up message stating that your computer is under attack by

Browser redirection to and other strange changes on browsers like Internet Explorer, Google Chrome, and Mozilla Firefox are also signs that is initiating an assault on your computer.

How to remove

To totally remove from the computer and get rid of relevant viruses and trojans, please execute the procedures as stated on this page. Make sure that you have completely scanned the system with the suggested malware removal tools and virus scanners.

Step 1 : Scan the PC with Combo Cleaner for Windows

Combo Cleaner is a trusted computer security and optimization tool equipped with a powerful virus and malware detection engine. This program can get rid of computer virus like through this procedure.

1. Download the application from the following page:

2. Save the file to your preferred location.

3. Double-click the downloaded file CCSetup.exe and install with the default settings.

4. At the end of the setup process, click Finish to run Combo Cleaner.

5. The tool will update the database file; please wait for this process to complete.

6. To begin checking for threats like, click on the Start Scan button. Wait for this scan to finish.

Screenshot of Combo Cleaner PC

7. At the end of the scan process, click on Remove all threats to delete malware, including all malicious objects from the computer.

To fully optimize the features of antivirus and privacy scanners, users may have to upgrade to the premium version.

Please continue with the succeeding removal procedures if you are comfortable manually getting rid of the computer virus and malicious items linked to it.

Step 2 : Start Windows in Safe Mode With Networking

The method of running Windows in Safe Mode before running a virus scan is effective in getting rid of This process can prevent most viruses and malware from loading, making it easier to detect and remove them.

1. On the Windows Search bar, please type msconfig.

Screenshot of Win 11 Search

2. Select and open System Configutation on the list of found results.

3. Once you are in the System Configuration window, go to the Boot tab.

Screenshot of Msconfig Win 11

4. Under the Boot Options area, please check Safe Boot so that it starts in Safe Mode after restarting.

5. Next, select Network. This will allow Windows to boot in Safe Mode with Networking.

6. Lastly, click on Apply and OK to save the changes.

7. Please restart Windows.

Do not forget to restore the normal boot process of Windows after running the virus scan. Simply repeat the method above, and this time, uncheck the Safe Boot option to run Windows normally.

Step 3 : Run Sophos Home Virus Scanner

To remove automatically, scanning the computer with this powerful virus and malware removal tool is recommended. This scanner does not just uncover known threats like viruses or malware; it is also effective in discovering harmful files associated to

1. Please click on the link below to download the program.

2. After downloading, locate the file SophosInstall.exe in the Downloads folder.

3. Install by double-clicking on the file.

4. If it prompts "Do you want to allow this app to make changes on your device?" please click Yes.

5. Next, it will display the Terms and Conditions page. Click the Install button to begin.

Screenshot of Terms by Sophos Home

6. Run the installation with the default settings. Please note that an internet connection is required in order to download important updates.

7. After finishing the installation, you must login to the dashboard. If you already have a Sophos account, please login. Otherwise, please enter your details and click on the Create Account button.

8. Once you are in the Sophos Home console, click the Scan button to start checking the computer for components.

Screenshot of Sophos Home

9. Scanning may take a while; please wait for this process to finish.

10. After scanning the computer, Sophos Home will start cleaning or deleting files infected with

11. You may now close Sophos Home. The computer is now free from, as well as associated malware and viruses.

After executing the above instructions, should have been completely removed from the computer. If there are still signs of infection or the computer is displaying unusual behaviors, please continue with the remaining procedures.

Another alternative for Windows 10/11 users is to scan the computer with Microsoft Defender Offline. This will run a virus scan in the recovery environment.

Step 4 : Double Check with Windows Security Apps

Microsoft Windows has a built-in security application that you can use to double-check if your computer is still infected with For Windows 10/11 users, please run Windows Security.

Windows 10 / 11 Instructions:

Windows Security is a free tool that was built to help you remove, viruses, and other malicious items from Windows 10/11 systems. Follow these procedures to scan your computer with the tool:

1. Tap or click the Search charm and search for Windows Security

2. Click Open to run the program.

Screenshot of Win 11 Search

3. On the Dashboard, click Virus and threat protection from the sidebar.

Screenshot of Win 11 Virus Protection

4. On the right panel, click on Scan Options to see different levels of checking the computer.

5. Next, please select Full Scan button.

Screenshot of Full Scan Win 11

6. Lastly, click on the Scan now button to start scanning for the presence of The process may take a while to complete.

7. After the scan, Delete/Quarantine identified threats, whether they were relevant to or not. You may now restart Windows to complete the virus removal process.

For Windows 8.1 and Windows 7, you can scan the computer for free with the Microsoft Malicious Software Removal Tool (MSRT 64-Bit). It is a stand-alone virus scanner tool that targets prevalent malware groups.

Originally published on April 21, 2015 at 10:12

About the author

13 thoughts on “Is a virus?”

  1. What’s the point? What if there’s a virus in one of the three software we have to download? Why can’t we just have one software that does all of the functions that the other three do?

  2. Downloaded and paid for the anti malware, but not removed the files it downloaded. I’m unable to uninstall them and the fixes you are recommending above will not remove these, right?

  3. Thank you for that explanation, is there any hazard affecting Linux distributions?

  4. My computer has been blocked.
    Error # DW6VB6
    The following information is being stolen…

    Facebook Login
    >Credit Card Details
    >Email Account Login
    >photos stored on this computer
    Please mail me the removal process.
    My contact no: +8801915130407

  5. I have downloaded TotalAV but I cannot log in now. Each time I get the message that my password is wrong.

  6. I need help ok so this is what happened a few days ago y received a drop box link in messenger and I (stupidly) open it when the bowser opened it took me to an error screen in the URL of the error is:

    This XML.file does not appear to have any style information associated with it. The document tree is:

    User project account problem
    User project billing account not in good standing

    The billing account for project (some numbers i guess is the file code or something ) is disabled in state delinquent

    (the file obviously never showed) The person who I received the message with the link posted 2 days later that it was spam due to a virus but I am not so sure so I wanted to know if this is really the malware of or some other malware or if it’s something else please help me I am kind of paranoiac about it I have some work information on that phone

  7. Followed the above procedures, paid for Malwarebytes software, still getting emails. Any suggestions?

  8. Google is responsible for this domain, how come they do not act on this even if you complain….

  9. This link is for Google Platform Storage services from Google. It’s not installing anything onto your computer. People use Google Platform to store videos, files or whatever, and then gives the user a link. The person shares the link so that someone else can access or view the files. It’s Google’s big data center.

  10. I just add to my users host file and point it to
    Any attempt to access that address will fail.
    We have also made it a company policy and block all access to as well.
    We automatically check and add our host file entries at login using a login script.

    If Google will not protect us from people who use their services in a malicious way, then Google leaves us no choice but to block them completely.

    So far, NO ONE HAS COMPLAINED. and we have blocked them for over a year.
    Problem solved.
    No more infections.

    P.S. We provide ongoing training to our employees on internet and email best practices, but people do make mistakes on occasion, but this helps to prevent a few anyway.


    Have you tried to login to your online Gmail account and “Block” the sender? To do this, please follow these steps:
    1. Login to your online Gmail account.
    2. Open the email from
    3. On upper-right corner of the message, click the Ellipses (3dots).
    4. On the drop-down list, click “Block…”

Leave a Comment

Your email address will not be published. Required fields are marked *