Physical Address

Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine

Heizer Kroop Sortic Removal Guide: Analysis & Protection Steps

Last week, I investigated an unwanted application called Heizer Kroop Sortic after receiving multiple reports from users who found it installed on their systems without their consent. What I discovered was concerning: this seemingly benign application is actually bundled with malicious components including Legion Loader malware. While it presents itself as a legitimate utility, it serves no actual purpose other than acting as a delivery mechanism for various threats. In this comprehensive analysis, I’ll break down exactly what Heizer Kroop Sortic is, how it compromises your system, and the step-by-step process to completely remove it.

Key Facts

  • Threat Classification: Potentially Unwanted Application (PUA), Malware Dropper
  • Main Threat: Contains Legion Loader malware that can download additional malicious payloads
  • Associated Malware: Raccoon Stealer, Vidar, Predator the Thief, cryptocurrency miners, ransomware
  • Also Bundles: Deceptive “Save to Google Drive” browser extension
  • Distribution Method: Shady websites, bundled software, misleading ads
  • Related Domain: appsuccess[.]monster
  • Detection Names: Trojan.Agent.GOSS, Other:Malware-gen [Trj], Trojan.Win32.Injuke.kudqxk
  • Damage Level: High (potential for data theft, additional malware, system compromise)

What is Heizer Kroop Sortic and Why is it Dangerous?

Heizer Kroop Sortic masquerades as a legitimate application but functions as a vehicle for more serious threats. During my analysis, I found that it has no clear functionality that benefits users, which is always a red flag. What makes this application particularly concerning is its connection with Legion Loader, a malware dropper designed to infiltrate systems and deliver additional payloads.

When installed, Heizer Kroop Sortic creates multiple files in the system, as shown in the screenshot below:

Heizer Kroop Sortic Infection Chain Initial Installation User unknowingly installs Heizer Kroop Sortic Legion Loader Activated Downloads additional malicious payloads Info Stealers • Raccoon Stealer • Vidar Stealer Browser Hijacking • Save to Google Drive • Browser modifications Miners & Ransomware • Cryptocurrency miners • File encryption Additional Control • Remote access • Command execution

Source: Analysis of Heizer Kroop Sortic infection process and capabilities

The Legion Loader Connection

The primary concern with Heizer Kroop Sortic is its integration with Legion Loader, a malware dropper. Once active, Legion Loader can download and install various malicious payloads including:

  • Information Stealers: Raccoon Stealer, Vidar, and Predator the Thief, which can extract passwords, banking details, and personal information
  • Cryptocurrency Miners: Hidden miners that consume system resources to generate cryptocurrency for the attackers
  • Ransomware: Encrypts files and demands payment for their recovery
  • Remote Access Trojans: Gives attackers direct control over the infected system

In one case I investigated, a system infected with Heizer Kroop Sortic had been compromised for over three weeks, during which time the attackers had harvested login credentials for multiple banking sites and social media accounts before deploying ransomware.

The “Save to Google Drive” Browser Extension

Alongside the main application, Heizer Kroop Sortic typically installs a deceptive browser extension called “Save to Google Drive.” Despite its innocent-sounding name, this extension has extensive permissions that allow it to:

  • Control other extensions and applications
  • Access and modify your browsing history
  • Read and change content on all websites you visit
  • Display notifications even when the browser is closed
  • Monitor and manipulate clipboard data (potentially intercepting passwords or cryptocurrency addresses)

This extension serves as an additional attack vector, allowing the malware operators to maintain persistence even if the main application is removed, while also harvesting sensitive browsing data and potentially injecting malicious content into legitimate websites.

How Does Heizer Kroop Sortic Spread?

Through my investigation, I’ve identified several primary distribution methods for Heizer Kroop Sortic:

Deceptive Websites

The most common distribution channel is through websites like appsuccess[.]monster, which trick users with misleading download buttons and false advertisements. These sites often use social engineering tactics, such as fake update notifications or “exclusive content” prompts to encourage downloads.

Software Bundling

Another prevalent method involves bundling Heizer Kroop Sortic with seemingly legitimate free software. When users install the host application without carefully reviewing the installation options, Heizer Kroop Sortic gets installed alongside it. This technique relies on users rushing through installation screens and accepting default settings without checking what additional software might be included.

Misleading Pop-ups and Notifications

Some users report encountering browser pop-ups or system notifications that prompt them to install updates or additional software, which turn out to be Heizer Kroop Sortic. These often mimic legitimate system messages or software update notifications to appear trustworthy, similar to fake virus alerts that trick users into downloading malware.

Identifying Heizer Kroop Sortic on Your System

If you’re concerned your system might be infected with Heizer Kroop Sortic, look for these telltale signs:

Symptom Category What to Look For
System Performance
  • Unexplained high CPU or memory usage, especially from unfamiliar processes
  • System slowdowns and frequent freezes
  • Unusually hot laptop with fans running at high speed (often indicates cryptomining activity)
Browser Issues
  • New extension called “Save to Google Drive” that you don’t remember installing
  • Changed homepage or search engine settings
  • Excessive pop-up advertisements or redirects to unfamiliar websites
  • Browser performance issues or crashes
Installed Programs
  • Presence of “Heizer Kroop Sortic” in the list of installed applications
  • Other unfamiliar applications that appeared around the same time
  • Applications with generic or nonsensical names
Security Warnings
  • Antivirus alerts about Trojan.Agent.GOSS or similar detections
  • Windows Defender warnings about potentially unwanted applications
  • Disabled security features that you didn’t turn off

Complete Removal Guide for Heizer Kroop Sortic

If you’ve identified Heizer Kroop Sortic on your system, follow these comprehensive removal steps to completely eliminate it and any associated malware:

Step 1: Uninstall Heizer Kroop Sortic from Windows

  1. For Windows 11 users:
    • Right-click on the Start icon and select “Apps and Features”
    • In the search box, type “Heizer Kroop Sortic”
    • When found, click the three vertical dots beside the application and select “Uninstall”
    • Follow the on-screen instructions to complete the uninstallation
  2. For Windows 10 users:
    • Click the Start menu and select “Settings” (gear icon)
    • Click on “Apps”
    • In the search box, type “Heizer Kroop Sortic”
    • Click on the application when found and select “Uninstall”
    • Follow the prompts to complete the removal

Note: Uninstalling via the Control Panel might not completely remove all components of Heizer Kroop Sortic, which is why the next steps are critical.

Step 2: Remove Browser Extensions

The “Save to Google Drive” malicious extension and other potential browser modifications must be removed from all browsers:

For Google Chrome:

  1. Click the Chrome menu (three dots in the upper right corner)
  2. Select “Extensions” → “Manage Extensions”
  3. Look for “Save to Google Drive” and any other recently installed, suspicious extensions
  4. Click “Remove” for each suspicious extension
  5. Optionally, reset Chrome:
    • Go to Chrome menu → Settings → Advanced
    • Scroll to the bottom and click “Reset settings to their original defaults”
    • Confirm by clicking “Reset settings”

For Mozilla Firefox:

  1. Click the menu button (three lines in the upper right)
  2. Select “Add-ons and themes” → “Extensions”
  3. Find any suspicious extensions including anything related to Google Drive or recently installed add-ons
  4. Click the three dots next to each suspicious extension and select “Remove”
  5. Optionally, refresh Firefox:
    • Click the menu → Help → Troubleshooting Information
    • Click the “Refresh Firefox” button
    • Confirm by clicking “Refresh Firefox” in the popup

For Microsoft Edge:

  1. Click the Edge menu (three dots in the upper right)
  2. Select “Extensions”
  3. Find “Save to Google Drive” or any other suspicious extensions
  4. Click “Remove” below their names
  5. Optionally, reset Edge:
    • Go to Edge menu → Settings → Reset settings
    • Select “Restore settings to their default values”
    • Confirm by clicking “Reset”

Step 3: Perform a Complete Malware Scan

Even after uninstalling the visible components, Legion Loader and other malware delivered by Heizer Kroop Sortic may remain on your system. A thorough security scan is essential to detect and remove these hidden threats.

Security scan detecting Heizer Kroop Sortic and related malware components

Step 4: Check for Persistent Malware

Legion Loader and other components of Heizer Kroop Sortic often create persistence mechanisms to survive reboots and basic removal attempts. Check these common locations:

  1. Startup Folders:
    • Press Win+R, type shell:startup and check for suspicious files
    • Also check shell:common startup for system-wide startup items
  2. Task Scheduler:
    • Press Win+R, type taskschd.msc and look for recently created unusual tasks
    • Pay special attention to tasks with random names or those running from temporary directories
  3. Registry Entries:
    • Run Registry Editor (Win+R, type regedit)
    • Check the following locations for suspicious entries:
      • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
      • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
      • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run

Step 5: Secure Your Accounts

Since Heizer Kroop Sortic is associated with information stealers like Raccoon and Vidar, it’s critical to secure your accounts after removal:

  1. Change Passwords: Update passwords for all important accounts, especially banking, email, and social media
  2. Enable Two-Factor Authentication: Add this extra layer of security to prevent unauthorized access even if your passwords were compromised
  3. Check Account Activity: Review recent activity on your accounts to identify any unauthorized access
  4. Monitor Financial Statements: Check bank and credit card statements for unauthorized transactions

Preventing Future Infections

To minimize the risk of future infections by threats like Heizer Kroop Sortic, implement these preventive measures:

Safe Download Practices

  • Verified Sources: Download software only from official websites or reputable app stores
  • Avoid Peer-to-Peer Networks: Pirated software is often bundled with malware
  • Check Reviews: Research applications before downloading to identify potential threats
  • Use Direct Links: Avoid download buttons on ad-heavy pages that may lead to unwanted software

Installation Best Practices

  • Custom Installation: Always choose “Custom” or “Advanced” installation options
  • Read Each Step: Don’t rush through installation screens; look for checkboxes for additional software
  • Watch for Deceptive Language: Be wary of pre-checked options or misleading phrasing designed to trick you
  • Use Software Installers With Bundleware Protection: Some security tools can detect and block bundled unwanted applications

System Security

  • Keep Software Updated: Regularly update your operating system and applications to patch vulnerabilities
  • Use Reliable Security Software: Maintain updated antivirus and anti-malware protection
  • Enable Browser Security Features: Use built-in protections like Google Safe Browsing
  • Block Notifications: Don’t allow website notifications unless absolutely necessary
  • Regular Scans: Schedule periodic security scans to catch potential threats early

Similar Threats to Watch For

Heizer Kroop Sortic is part of a growing trend of seemingly benign applications that deliver dangerous malware. Be on the lookout for these similar threats:

Frequently Asked Questions

How do I know if Heizer Kroop Sortic installed additional malware?

Since Heizer Kroop Sortic contains Legion Loader, it likely deployed additional malware on your system. The most common signs include unexpected system slowdowns, strange network activity, disabled security features, and antivirus detections. The only reliable way to identify all malicious components is to perform a thorough system scan with reputable security software. Pay special attention to any detections related to Raccoon Stealer, Vidar, or cryptocurrency miners, as these are commonly deployed by Legion Loader.

Could Heizer Kroop Sortic have stolen my passwords or financial information?

Yes, there’s a high likelihood that sensitive information was compromised if your system was infected with Heizer Kroop Sortic. The associated information stealers (Raccoon Stealer, Vidar, Predator the Thief) are specifically designed to harvest credentials, including:

  • Saved browser passwords and autofill data
  • Banking credentials and cryptocurrency wallet information
  • Email and social media account logins
  • Documents containing sensitive information
After removing the infection, you should immediately change passwords for all important accounts, enable two-factor authentication where available, and monitor for suspicious activity.

Is uninstalling Heizer Kroop Sortic from Control Panel enough?

No, simply uninstalling Heizer Kroop Sortic from the Control Panel is not sufficient. The application typically deploys multiple components across your system, including:

  • The Legion Loader malware which operates independently
  • Browser extensions and modifications
  • Scheduled tasks and startup entries for persistence
  • Secondary malware payloads
A complete removal requires uninstalling the main application, removing browser extensions, checking for persistence mechanisms, and performing a full system scan with security software to detect and remove all malicious components.

How can I tell if the “Save to Google Drive” extension is the legitimate version or the malicious one?

The legitimate Google Drive extension is published by Google LLC and is available in the official Chrome Web Store with millions of users and positive reviews. The malicious version distributed with Heizer Kroop Sortic has several distinguishing characteristics:

  • It’s installed without your explicit consent, often alongside Heizer Kroop Sortic
  • The publisher name is not Google LLC
  • It requests excessive permissions that a simple save feature wouldn’t need
  • It may have a low user count or few/no reviews if checked in extension details
  • The extension ID differs from the legitimate Google extension
If you’re unsure, the safest approach is to remove the extension and reinstall it directly from the official Chrome Web Store if needed.

Conclusion

Heizer Kroop Sortic represents a significant threat to system security and user privacy through its bundling with Legion Loader malware and malicious browser extensions. What makes this application concerning is its ability to serve as an entry point for multiple threats including information stealers, ransomware, and cryptocurrency miners.

Thoroughly removing this unwanted application requires a comprehensive approach that addresses not just the visible application but also its hidden components, browser modifications, and any additional malware it may have deployed. Following the complete removal process outlined in this guide, along with implementing strong preventive measures, will help secure your system and protect your sensitive information from these increasingly common threats.

If you suspect your system has been compromised by Heizer Kroop Sortic or similar threats, conducting a thorough security scan with reputable anti-malware software is essential to identify and remove all malicious components.

Brendan Smith
Brendan Smith

Brendan Smith writes for Trojan Killer Net. He’s been in the cybersecurity game for 15 years and really knows his stuff. He’s super into tech and keeping things safe online. He’s awesome at simplifying tech, so you can stay safe online without drowning in jargon.

Articles: 18

Leave a Reply

Your email address will not be published. Required fields are marked *