Saturday, March 29, 2025
HomeCVE/vulnerabilityNew Chrome Installer Fails on Windows 10 & 11 With "This app...

New Chrome Installer Fails on Windows 10 & 11 With “This app can’t run on your PC” Error

Published on

SIEM as a Service

Follow Us on Google News

A recent snag in Google’s Chrome distribution process has left Windows users unable to install the browser on their Intel and AMD systems.

The issue, first reported by Windows Latest on March 25, arises when users attempt to run the ChromeSetup.exe file, only to be met with the error message: “This app can’t run on your PC: To find a version for your PC, check with the software publisher.”

This glitch is not attributed to any intentional block by Microsoft but rather an oversight on Google’s part.

It appears that Google inadvertently shipped an ARM version of the Chrome installer, which is incompatible with the majority of Windows systems that run on Intel and AMD processors.

Cause of the Error

The problem became evident when the ChromeSetup.exe file was analyzed, revealing references to “Montgomery Multiplication for ARMv8,” a cryptographic routine often used in encryption protocols.

ChromeSetup.exe file
ChromeSetup.exe file

This code snippet confirms that the installer was built for ARM-based devices, such as those equipped with Snapdragon processors.

Cause of the Error
Cause of the Error

Consequently, when users try to install Chrome on their x64 systems, Windows detects a compatibility issue and prevents the app from running.

The error affects anyone attempting to install Chrome directly from Google’s official website via the downloadable ChromeSetup.exe file.

Users are then left with no option but to click “close” when encountering the compatibility error, as Windows offers no workaround for this issue.

Solution for Users

For individuals seeking to install Chrome immediately, Google offers an alternative solution through its offline installer.

These offline installers are unaffected by the glitch and can be downloaded from Google’s official website. By using these installers, users can circumvent the current issue and successfully set up Chrome on their Windows 10 and 11 systems.

In summary, the Chrome installation problem is an unintended consequence of Google’s distribution mishap rather than any sabotage by Microsoft.

Users can navigate this issue by utilizing the offline installers until Google rectifies the problem with the standard online installer.

Steps to Install Chrome Using Offline Installer

  1. Visit Google’s Download Page: Go to Google’s Chrome download page using a different browser like Microsoft Edge.
  2. Download Offline Installer: Look for the option to download the offline installer. This might involve clicking on more download options.
  3. Run Offline Installer: Once the offline installer is downloaded, run the file and follow the on-screen instructions to complete the installation.

By following these steps, users can bypass the current compatibility issue and ensure they have Chrome up and running on their Windows systems.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...