The domain is owned and operated by Google. This  is used by several programs and applications to interact and obtain data with from one another. For example, if an application or website is using services of Google like Maps, Emails, Analytics, Cloud, and so on, an API is needed to have better collaboration between the application/website and Google services.  With regards to, it is a subdomain that hosts several services and platforms including the Google Cloud Storage.

Is harmful?

As stated, is subdomain that hosts the Google Cloud Storage. This is a file hosting service offering different products that fits the requirement of several online businesses and software developers. The bad thing is, even cyber offenders are taking advantage of on their online fraudulent activities. They are abusing it to deploy malicious programs, phishing scams, spamming, and many other online counterfeiting activities. This is not a new thing and the company is very much aware of it. Google is doing all the necessary measures to control this abuse. In fact, anyone can report a suspected abuse on Google Cloud Planform for any misuse of services that runs on Google infrastructure.

Malware detected on

It is possible that your anti-virus or anti-malware program detects a harmful activities or objects from As stated, there are clients on this server that are abusive. Also, malware that is present on the computer may tend to communicate with the attackers server on Anti-virus application senses this suspicious behavior and the tendency is to block the connection in order to avoid any harm. See sample image below how a real-time protection of security program detects and blocks the outbound connection to

In the case that computer security application sends an alert about suspicious activities involving, immediately run a complete scan to detect the culprit. Malware could be present on the computer that triggers the suspicious connection to

Threat behavior


Malware, Trojan, or virus running on the computer may redirect affected browser to drive-by-download web site such as Attackers are using this method to spread threats using various web addresses to evade general blocking capability of most security programs. That is why regular updating of your anti-virus and anti-malware program is vital.

Typically, redirects, hijacker, and other relevant threats are embedded on potentially unwanted programs (PUP) or altered legitimate free software like tools, games, multimedia players, and software updates.


If starts to download and install unwanted program onto visitor’s computer, there is really no obvious signs except for sluggish system performance. If your computer is equipped with effective security tool, you might get alerted with a pop-up message stating that computer is under attack by

Browser redirection to and other strange changes on browsers like Internet Explorer, Google Chrome, and Mozilla Firefox are also sign that is initiating an assault on your computer.

How can you remove

To totally remove from the computer and get rid of relevant adware, please execute the procedures as stated on this page. Make sure that you have completely scan the system with suggested malware removal tools and virus scanners.

Step 1 : Scan the computer with Sophos Antivirus

1. Download Sophos Virus Removal Tool from the link below. Save the file on your computer where you can easily access it.

2. Once the download completes, browse the location of the file. Double-click to run the program and begin the install process.

Screnshot of Sophos Installer

3. On first windows of installation wizard, click Next to continue. Then, it will display the program’s License Agreement. You need to Accept the terms in order to proceed. If Windows prompts for User Account Control, please click Yes to proceed.

Screenshot of Sophos EULA Page

4. On succeeding windows, click Next or Continue to carry on with the installation. After completing the installation process, Launch Sophos Virus Removal Tool.

5. Internet connection is required when running this scanner in order to download important updates. Make sure that everything is up-to-date to effectively remove adware like

6. Click the  button to  carry out the Scan. This will check the system for presence of malicious objects, malware, and viruses. The tool reveals items that were found linked to and other suspicious entities. Be sure to remove all identified threats.

Screenshot of Sophos Virus Scan

Step 2 : Run AdwCleaner to totally remove

1. Download the tool called AdwCleaner from the location stated below.

2. Once you have completed the download, please close all running programs on the computer.

3. Locate the file and double-click on adwcleaner.exe to start running the tool.


4. It searches for presence of harmful programs, plug-ins, add-ons, or any data that were found malicious and linked to You may have to delete each detected item.

5. Once scan is done, the tool may need to reboot your computer to finalize the cleaning process.

6. After reboot, open AdwCleaner once more. Click on Uninstall to remove this program from your computer.

How to protect the computer?

The initial defense that comes to the mind of any computer users is to install an anti-virus or anti-malware program. This move is sensible and probably the most practical way to protect the computer against attack. Hence, keep in mind that having a security software do not give full guarantee of protection. The most part of the prevention still lies on being cautious of users and therefore we are providing the following information as guidelines to protect the computer from virus infection.

Avoid Malicious Websites

There are enormous numbers of websites that was made for the primary purpose of spreading Normally, these sites are involved in integrating malicious pop-up and browser hijacker, that will eventually cause further virus infection. Avoid such kind of websites.

Delete Phishing Emails

The mass-mailing of computer viruses gives the attackers the luxury of spreading their malicious code in just one send off. This will arrive in the inbox as email that appears to be from a legitimate organization. So, if you receive an unexpected email with a link or an attached file, better delete it immediately.

Do Not Click a Suspicious Link

Links from social media, forums, and blog sites are sometimes being utilized by attackers to drive web users to a malicious page that contains malicious code. Therefore, do not just click on any link especially if it looks suspicious. Accidental access to the destination site may lead to infection.

Be Careful When Downloading Files

Cracked software, serial key generators, and several freeware are seen as another method that spreads the virus. Avoid acquiring these types of application and if there is a need to download a freeware or shareware, be sure to obtain it from the official website or trusted providers.

About the author

12 thoughts on “”

  1. What’s the point? What if there’s a virus in one of the three software we have to download? Why can’t we just have one software that does all of the functions that the other three do?

  2. Downloaded and paid for the anti malware, but not removed the files it downloaded. I’m unable to uninstall them and the fixes you are recommending above will not remove these, right?

  3. Thank you for that explanation, is there any hazard affecting Linux distributions?

  4. My computer has been blocked.
    Error # DW6VB6
    The following information is being stolen…

    Facebook Login
    >Credit Card Details
    >Email Account Login
    >photos stored on this computer
    Please mail me the removal process.
    My contact no: +8801915130407

  5. I have downloaded TotalAV but I cannot log in now. Each time I get the message that my password is wrong.

  6. I need help ok so this is what happened a few days ago y received a drop box link in messenger and I (stupidly) open it when the bowser opened it took me to an error screen in the URL of the error is:

    This XML.file does not appear to have any style information associated with it. The document tree is:

    User project account problem
    User project billing account not in good standing

    The billing account for project (some numbers i guess is the file code or something ) is disabled in state delinquent

    (the file obviously never showed) The person who I received the message with the link posted 2 days later that it was spam due to a virus but I am not so sure so I wanted to know if this is really the malware of or some other malware or if it’s something else please help me I am kind of paranoiac about it I have some work information on that phone

  7. Followed the above procedures, paid for Malwarebytes software, still getting emails. Any suggestions?

  8. Google is responsible for this domain, how come they do not act on this even if you complain….

  9. This link is for Google Platform Storage services from Google. It’s not installing anything onto your computer. People use Google Platform to store videos, files or whatever, and then gives the user a link. The person shares the link so that someone else can access or view the files. It’s Google’s big data center.

  10. I just add to my users host file and point it to
    Any attempt to access that address will fail.
    We have also made it a company policy and block all access to as well.
    We automatically check and add our host file entries at login using a login script.

    If Google will not protect us from people who use their services in a malicious way, then Google leaves us no choice but to block them completely.

    So far, NO ONE HAS COMPLAINED. and we have blocked them for over a year.
    Problem solved.
    No more infections.

    P.S. We provide ongoing training to our employees on internet and email best practices, but people do make mistakes on occasion, but this helps to prevent a few anyway.

Leave a Comment

Your email address will not be published. Required fields are marked *