Physical Address

Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine

Tao Raiqsuv Utils: Complete Analysis and Removal Guide

Tao Raiqsuv Utils is a deceptive application that appears to have no legitimate functionality while posing significant security risks to your system. Despite its innocuous name, security researchers have identified this application as a delivery mechanism for Legion Loader malware, which serves as a distribution platform for various dangerous payloads. This comprehensive guide provides a technical analysis of Tao Raiqsuv Utils, explains its malicious capabilities, and offers detailed removal instructions to secure your system.

Key Facts

  • Threat Name: Tao Raiqsuv Utils (also known as Tao Raiqsuv Utils harmful application)
  • Type: Potentially unwanted application (PUA), malware dropper, adware
  • Primary Risk: Loads Legion Loader malware that deploys additional threats
  • Secondary Payloads: Information stealers (Raccoon Stealer, Vidar, Predator the Thief), ransomware, cryptominers
  • Distribution Methods: Deceptive websites, bundled software, misleading advertisements
  • Browser Components: Fake “Save to Google Drive” extension with extensive permissions
  • Affected Browsers: Google Chrome, Mozilla Firefox, Microsoft Edge, Safari
  • System Impact: Privacy violations, data theft, system performance degradation, potential financial loss
  • Detection Names: NANO-Antivirus (Trojan.Win32.Injuke.kudqxk), Tencent (Unk.Win32.Script.404946)

What is Tao Raiqsuv Utils?

Tao Raiqsuv Utils presents itself as a legitimate application but lacks any beneficial functionality. Technical analysis reveals that it serves as a malicious vehicle for deploying Legion Loader, a sophisticated malware dropper designed to install multiple malicious payloads on infected systems. The application establishes persistence on the victim’s machine and facilitates the installation of browser extensions with extensive and dangerous privileges.

Upon installation, Tao Raiqsuv Utils deploys a fake browser extension called “Save to Google Drive,” which requests permissions to manage other extensions, access browsing history, modify website content, display notifications, and even manipulate clipboard data. These excessive permissions enable threat actors to compromise user privacy, expose victims to scams, and degrade the overall browsing experience.

Tao Raiqsuv Utils Infection Chain Initial Distribution Deceptive websites Bundled software Tao Raiqsuv Utils Fake application Browser extension Legion Loader Malware dropper Persistence mechanism Secondary Payloads Info stealers Ransomware Multi-stage infection process showing how Tao Raiqsuv Utils leads to multiple malicious payloads

Source: Security analysis of Tao Raiqsuv Utils infection chain and associated malware

Technical Analysis

Tao Raiqsuv Utils employs several deceptive techniques to compromise systems and evade detection:

Legion Loader Component

The core malicious functionality of Tao Raiqsuv Utils comes from its ability to deploy Legion Loader, a sophisticated malware dropper with the following capabilities:

  • Multi-stage Infection: Uses a staged approach to establish persistence and deploy additional malware
  • Dynamic Payload Selection: Can deliver different malware based on system configuration or attacker preferences
  • Information Stealer Deployment: Commonly installs Raccoon Stealer, Vidar, or Predator the Thief to harvest sensitive data
  • Command and Control: Maintains communication with remote servers to receive instructions
  • Anti-Analysis Techniques: Implements measures to evade detection by security software

Browser Extension Analysis

The “Save to Google Drive” extension deployed by Tao Raiqsuv Utils requests excessive permissions that pose significant security risks:

Permission Security Risk
Manage other extensions Can disable security extensions and install additional malicious extensions
Access browsing history Compromises privacy by tracking all websites visited, potentially exposing sensitive information
Block content on websites Can inject malicious content or remove security warnings on websites
Display notifications Shows deceptive notifications that may lead to additional malware downloads or scams
Modify clipboard data Can alter copied information, particularly dangerous for cryptocurrency addresses or banking details

Secondary Payload Analysis

Legion Loader, deployed by Tao Raiqsuv Utils, delivers various secondary payloads that pose additional threats:

Common Secondary Payloads Distributed by Legion Loader Information Stealers 38% Crypto Miners 29% Banking Trojans 21% Ransomware 12%

Source: Distribution analysis of payloads delivered by Legion Loader, 2024-2025

Infection Methods and Distribution

Tao Raiqsuv Utils uses several deceptive methods to infiltrate user systems:

Primary Distribution Channels

  • Deceptive Websites: Primarily distributed through unreliable websites such as appperfectlab[.]com, which uses misleading claims to encourage downloads
  • Software Bundling: Silently installed alongside free software when users choose default installation options instead of custom/advanced options
  • Misleading Advertisements: Promoted through deceptive pop-up ads that masquerade as system alerts or legitimate software updates
  • Fake Notifications: Browser notifications that trick users into allowing installations or website access
  • Peer-to-Peer Networks: Spread through P2P file-sharing platforms, often disguised as legitimate applications

Impact and Risks

The installation of Tao Raiqsuv Utils can lead to severe consequences:

  • Data Theft: Secondary payloads like Raccoon Stealer can harvest passwords, cookies, and financial information
  • Financial Loss: Banking trojans or cryptominers may lead to direct financial damage
  • Identity Theft: Stolen personal information can be used for identity fraud
  • System Performance Degradation: Cryptominers and background processes consume system resources
  • Privacy Violations: Browser history and online activity tracking compromises user privacy
  • File Encryption: Ransomware payloads may encrypt user files and demand payment
  • Complete System Compromise: Advanced payloads may give attackers full access to the infected system

How to Remove Tao Raiqsuv Utils

Due to the complex nature of Tao Raiqsuv Utils and its ability to deploy multiple malicious components, a systematic approach to removal is required:

1. Remove the Application Using Control Panel

First, uninstall the application from your system:

For Windows 11 users:

  1. Right-click on the Start icon and select Apps and Features
  2. In the search field, type “Tao Raiqsuv Utils”
  3. When found, click the three vertical dots next to it and select Uninstall
  4. Follow the uninstallation prompts to complete the process

For Windows 10 users:

  1. Right-click on the Start button and select Programs and Features from the Quick Access Menu
  2. Locate “Tao Raiqsuv Utils” in the list of installed programs
  3. Select it and click Uninstall
  4. Follow the uninstallation wizard to complete the process

For Windows 7 users:

  1. Click Start and select Control Panel
  2. Select Programs and then Uninstall a program
  3. Find “Tao Raiqsuv Utils” in the list, select it, and click Uninstall
  4. Follow the prompts to complete the uninstallation

2. Remove Browser Extensions

The fake “Save to Google Drive” extension and other potentially malicious extensions must be removed from all browsers:

Google Chrome:

  1. Click the Chrome menu icon (three dots in the upper right corner)
  2. Select Extensions and then Manage Extensions
  3. Locate the “Save to Google Drive” extension and any other recently installed suspicious extensions
  4. Click Remove for each suspicious extension
  5. If extensions cannot be removed normally, consider resetting Chrome settings:
    • Go to Chrome menu > Settings > Advanced (scroll down)
    • Click Reset and clean up > Restore settings to their original defaults
    • Click Reset settings in the confirmation dialog

Mozilla Firefox:

  1. Click the Firefox menu button (three horizontal lines)
  2. Select Add-ons and themes
  3. Click Extensions in the left sidebar
  4. Find any suspicious extensions, click the three dots next to them, and select Remove
  5. If you continue to have issues, reset Firefox:
    • Click Firefox menu > Help > Troubleshooting Information
    • Click the Refresh Firefox button
    • Confirm by clicking Refresh Firefox in the dialog

Microsoft Edge:

  1. Click the Edge menu icon (three dots in the upper right)
  2. Select Extensions
  3. Find suspicious extensions and click Remove beneath them
  4. If problems persist, reset Edge settings:
    • Go to Edge menu > Settings > Reset settings
    • Select Restore settings to their default values
    • Click Reset to confirm

Safari (Mac):

  1. Click Safari in the menu bar and select Preferences
  2. Go to the Extensions tab
  3. Select any suspicious extensions and click Uninstall
  4. If issues persist, clear Safari’s history and data:
    • Click Safari > Clear History and Website Data
    • Select all history and click Clear History

3. Remove Legion Loader and Secondary Infections

Since Tao Raiqsuv Utils deploys Legion Loader, which in turn can install various malware, a comprehensive anti-malware scan is essential. For effective malware removal, we recommend using specialized security software:

Trojan Killer interface showing detection of Tao Raiqsuv Utils and Legion Loader components
Download Trojan Killer

Download the official version from GridinSoft’s website to ensure you get the authentic software

Step Instructions
1. Download and Install
  • Download Trojan Killer from the official website
  • Run the installer and follow the on-screen instructions
  • Launch the program after installation completes
2. Perform a Full System Scan
  • From the main interface, click on “Full Scan” to begin a comprehensive system check
  • The scan will detect Tao Raiqsuv Utils, Legion Loader, and any secondary infections
  • Wait for the scan to complete – this may take some time depending on your system
3. Review and Remove Threats
  • After the scan completes, review the list of detected threats
  • Make sure all threats are selected for removal
  • Click “Remove Selected” to clean your system
4. Restart Your System
  • After the cleaning process is complete, restart your computer
  • This ensures all components of the infection are completely removed

4. Additional Manual Removal Steps (Advanced Users)

Advanced users may perform these additional steps to ensure complete removal:

# Check for and remove suspicious scheduled tasks
Get-ScheduledTask | Where-Object {
    $_.TaskName -match "UpdateTask|SyncTask|RAUpdate" -or
    $_.Description -eq "" -and $_.TaskPath -notmatch "Microsoft"
} | Unregister-ScheduledTask -Confirm:$false
 
# Check for suspicious startup entries
$startupLocations = @(
    "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run",
    "HKLM:\Software\Microsoft\Windows\CurrentVersion\Run"
)
 
foreach ($location in $startupLocations) {
    Get-ItemProperty -Path $location |
    ForEach-Object {
        $props = $_.PSObject.Properties | Where-Object {
            $_.Name -notlike "PS*" -and $_.Name -notmatch "^(Microsoft|Windows)"
        }
        foreach ($prop in $props) {
            if ($prop.Value -match "AppData|Temp|%Temp%|ProgramData\\[^\\]+\.exe") {
                Write-Host "Removing suspicious startup entry: $($prop.Name)"
                Remove-ItemProperty -Path $location -Name $prop.Name
            }
        }
    }
}
 
# Check for and remove suspicious services
Get-Service | Where-Object {
    $_.DisplayName -match "Update Service|Sync Service" -and
    $_.Status -eq "Running" -and
    (Get-WmiObject Win32_Service -Filter "Name='$($_.Name)'").PathName -match "AppData|Temp|ProgramData\\[^\\]+\.exe"
} | ForEach-Object {
    Write-Host "Stopping and removing suspicious service: $($_.Name)"
    Stop-Service -Name $_.Name -Force
    $servicePath = (Get-WmiObject Win32_Service -Filter "Name='$($_.Name)'").PathName
    sc.exe delete $_.Name
    if ($servicePath -match "^\"(.+)\"") {
        $exePath = $matches[1]
        if (Test-Path $exePath) {
            Remove-Item $exePath -Force
        }
    }
}

Prevention Measures

To avoid infections by Tao Raiqsuv Utils and similar unwanted applications, follow these security best practices:

Protection Measure Implementation
Download from Official Sources Only download software from official websites or trusted app stores. Avoid third-party download sites, especially those promising free versions of paid software.
Use Custom Installation Always choose “Custom” or “Advanced” installation options and carefully review each step to decline bundled software offers.
Verify Website Legitimacy Check website URLs carefully and be suspicious of sites with unusual domain names, spelling errors, or that pressure you into immediate downloads.
Manage Browser Notifications Be cautious about allowing website notifications. Regularly review and clean up notification permissions in your browser settings.
Keep Software Updated Maintain current versions of your operating system, browsers, and security software to patch vulnerabilities that might be exploited.
Use Ad-Blockers Install reputable ad-blocking extensions to reduce exposure to deceptive advertisements that may lead to unwanted software.
Implement Email Security Be cautious with email attachments and links, even from known contacts. Verify unexpected communications before downloading or clicking.
Regular Security Scans Perform periodic scans with reputable security software to detect and remove potentially unwanted applications before they cause harm.

Similar Threats

Several other potentially unwanted applications operate similarly to Tao Raiqsuv Utils:

Other examples of similar unwanted applications include Caveqn App, Roxaq Apps, and Cuiall Apps, which all use deceptive tactics to infiltrate systems and potentially deploy malicious components.

Frequently Asked Questions

Is Tao Raiqsuv Utils a legitimate application?

No, Tao Raiqsuv Utils has no legitimate functionality. Security analysis reveals it serves primarily as a vehicle to deploy Legion Loader malware, which then downloads additional threats like information stealers and ransomware. The application provides no beneficial services to users while posing significant security risks. Any claims about its utility are deceptive and designed to trick users into installation.

How dangerous is the Legion Loader component of Tao Raiqsuv Utils?

Legion Loader is a highly dangerous malware dropper that serves as a gateway for multiple severe threats. Once deployed by Tao Raiqsuv Utils, it can download and install information stealers (like Raccoon Stealer, Vidar, and Predator the Thief), banking trojans, cryptominers, and even ransomware. This versatility makes Legion Loader particularly dangerous, as a single infection can lead to multiple types of damage: data theft, financial loss, computing resource hijacking, and file encryption. The modular nature of Legion Loader also allows attackers to update or change payloads over time, extending the threat lifecycle.

Can manual removal effectively eliminate Tao Raiqsuv Utils and related threats?

Manual removal of Tao Raiqsuv Utils and its components is possible but challenging for several reasons. The multi-stage infection process means you need to address the main application, browser extensions, Legion Loader components, and any secondary payloads already deployed. Additionally, these threats often use multiple persistence mechanisms (startup entries, scheduled tasks, registry modifications) that must be completely removed to prevent reinfection. While technically possible for advanced users, manual removal risks overlooking components, especially fileless or deeply embedded elements. For most users, automated removal with specialized security software provides a more thorough and reliable solution.

How can I tell if the “Save to Google Drive” extension on my browser is legitimate or malicious?

Distinguishing between the legitimate Google Drive extension and the malicious version deployed by Tao Raiqsuv Utils requires careful examination. The genuine Google Drive extension is published by Google LLC and available through official browser stores with high user ratings and a verified publisher badge. The malicious version typically lacks official verification, has few or suspicious reviews, and requests excessive permissions beyond what’s needed for its stated purpose (like clipboard access or the ability to modify webpage content). Additionally, if you don’t recall installing a Google Drive extension but find one present, or if it appeared after installing unfamiliar software, this suggests the extension may be malicious. When in doubt, remove the extension and reinstall only from the official browser store.

What information is at risk if my system is infected with Tao Raiqsuv Utils?

A Tao Raiqsuv Utils infection puts virtually all sensitive information on your system at risk due to the information stealers it typically deploys. This includes stored passwords in browsers, authentication cookies (potentially allowing account takeovers without passwords), banking credentials, credit card details, cryptocurrency wallet information, email content, personal documents, and browsing history. The infection may also enable keylogging to capture data you type, including passwords not saved in browsers. Additionally, the malware may access webcams, microphones, or screenshots, potentially compromising personal privacy. The combination of these collection methods creates a comprehensive profile that attackers can use for identity theft, financial fraud, or account compromise.

Conclusion

Tao Raiqsuv Utils represents a significant security threat despite its innocuous name and appearance. Its primary purpose is to deploy Legion Loader, which serves as a distribution platform for various malicious payloads including information stealers, ransomware, and cryptominers. The fake browser extension it installs further compromises user privacy and security through excessive permissions.

The multi-layered nature of this threat requires a comprehensive approach to removal, addressing not only the main application but also browser extensions and secondary infections. Using specialized security software like Trojan Killer is recommended for thorough removal.

Prevention remains the best strategy against such threats. Practice safe browsing habits, download software only from official sources, use custom installation options, and maintain updated security software to minimize the risk of infection. By following these practices, users can protect themselves from Tao Raiqsuv Utils and similar potentially unwanted applications.

Gridinsoft Team
Gridinsoft Team

Founded in 2003, GridinSoft LLC is a Kyiv, Ukraine-based cybersecurity company committed to safeguarding users from the ever-growing threats in the digital landscape. With over two decades of experience, we have earned a reputation as a trusted provider of innovative security solutions, protecting millions of users worldwide.

Articles: 139

Leave a Reply

Your email address will not be published. Required fields are marked *