Danger level 3
Type: Potentially Unwanted Application

Chrom1um Browser

Chrom1um Browser is not a browser you expect it to be. If you have downloaded it onto your PC, you must have expected it to provide you with a secure and interactive way to browse the web. We classify this browser as a potentially unwanted program, and this is not without a reason. Right when we initiated the analysis of this PUP, we found that it is similar to Ghokswa and Crxbro browsers, and that already says a lot. All three of these browsers were created using the Chromium platform, and the idea is that they resemble Google Chrome. In some cases, this platform is exploited to create highly unreliable PUPs that basically imitate Google Chrome, which is the most popular browser in the world. Of course, this is done with a purpose to fool users in one way or another, and you cannot allow being fooled yourself. Continue reading to learn more about the risks you might face if you do not remove Chrom1um Browser.

The name of Chrom1um Browser is likely to be designed to trick computer users as well. Although there is an obvious difference, users might miss it when being offered this program. Since an official installer does not exist, it is most probable that this PUP will be spread along with other programs. We can only predict the kind of software that might be bundled with this program, and we fear that it will be malicious infections and other potentially unwanted programs. Luckily, it is unlikely that Chrom1um Browser will be downloaded without your permission. Nevertheless, if you are offered a bunch of programs by the same installer, you might miss important details, such as the name of a seemingly harmless browser. On top of that, users are less likely to familiarize themselves with legal information when downloading multiple programs. Of course, that is a mistake because privacy policies usually give an idea regarding the true nature of the software they correspond to. Unfortunately, it is possible that most users will not even have access to legal information associated with the suspicious browser.

The suspicious Chrom1um Browser installs itself in the %ProgramFiles% (or %ProgramFiles(x86)%) directory; however, it does not represent itself as a separate program. Instead, it changes the Target of your original Chrome browser, which means that the PUP might appear when you try launching Chrome. As mentioned previously, this PUP might imitate the popular browser, and you might remain unaware of using some imitation! Of course, if you are vigilant, you should realize that this browser does not have your regular bookmarks, and it might look different. On top of that, as our researchers have found, this program might introduce you to unfamiliar search tools. Even if, at first, you are mistaken thinking that your original Google Chrome browser was hijacked, you will know that something is not right. Our researchers list yessearches.com, newsearch123.com, walasearch.com, and dozensearch.com as few of the many hijackers that could be infiltrated without your permission.

It is not entirely clear what the purpose of Chrom1um Browser is, but the creators of this misleading program could use it in several different ways. One of the scenarios is that this browser is used to introduce you to browser hijackers that might show sponsored links and trick you into visiting potentially malicious websites. It is also possible that this infection will be used to track information that might include personally identifiable information as well. Overall, it is possible that this browser will open security backdoors, and that is something you need to prevent from happening. Luckily, you can eliminate this undesirable program from your operating system yourself, manually. The steps shown below might seem intimidating if you are inexperienced, but you should be able to handle them. If you face problems, contact us via the comments section below, and we will help you out.

N.B. If you detect other threats (we recommend using a malware scanner to look for them), we strongly advise implementing automated malware detection and removal software to erase them. Another important reason to invest in this software is further protection against dangerous malware. Make sure you consider this, as well as the security of your virtual identity, before you move on.

Chrom1um Browser Removal

  1. Simultaneously tap Win+R to access RUN.
  2. Enter regedit.exe into the dialog box and click OK to access the Registry Editor.
  3. Delete the keys (highlighted) in these paths:
    • HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\Chrom1um
    • HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Chrom1um
    • HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Clients\StartMenuInternet\Chrom1um
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WSModules
    • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WSModules
    • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\WSModules
  4. Delete the progid value in these keys (only if the value data has the Chrom1umHTM string):
    • HKEY_CURRENT_USER\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice
    • HKEY_CURRENT_USER\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice
    • HKEY_CURRENT_USER\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\UserChoice
    • HKEY_CURRENT_USER\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht\UserChoice
    • HKEY_CURRENT_USER\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml\UserChoice
  5. Simultaneously tap Win+E to access Explorer
  6. Enter %PROGRAMFILES% (or %PROGRAMFILES(x86)%) into the address bar.
  7. Delete the Chrom1um Browser folder.
  8. Enter %WINDIR%\Tasks (or %WINDIR%\System32\Tasks) into the address bar.
  9. Delete the Chrom1umBrowserUpdateCore, Chrom1umBrowserUpdateUA, and Chrom1umCheckTask tasks in this directory.
Download Spyware Removal Tool to Remove* Chrom1um Browser
  • Quick & tested solution for Chrom1um Browser removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.