URL:

https://www.deepl.com/translator

Full analysis: https://app.any.run/tasks/a603fef8-fc40-4da6-9bc8-46b383bc36de
Verdict: Malicious activity
Analysis date: August 26, 2020, 13:40:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

A0D2E0E8AD95434EE262BD09E90FFD9A

SHA1:

3EFE49896F468008E2E9D38383B61D1A8C151CC4

SHA256:

429AF0DF17A5AFA5DB9EB71CE8638E1644C18F926F1B704C31779777A551A0CB

SSDEEP:

3:N8DSLVJZ3RXELO4M:2OLjZ3CZM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DeepLSetup.exe (PID: 1776)
      • DeepL.exe (PID: 496)
      • Update.exe (PID: 2736)
      • DeepL.exe (PID: 2644)
      • CefSharp.BrowserSubprocess.exe (PID: 2504)
      • CefSharp.BrowserSubprocess.exe (PID: 2876)
      • CefSharp.BrowserSubprocess.exe (PID: 3360)
      • CefSharp.BrowserSubprocess.exe (PID: 2052)
    • Loads dropped or rewritten executable

      • DeepL.exe (PID: 496)
      • DeepL.exe (PID: 2644)
      • CefSharp.BrowserSubprocess.exe (PID: 2504)
      • CefSharp.BrowserSubprocess.exe (PID: 3360)
      • CefSharp.BrowserSubprocess.exe (PID: 2876)
      • CefSharp.BrowserSubprocess.exe (PID: 2052)
    • Changes settings of System certificates

      • DeepL.exe (PID: 496)
      • DeepL.exe (PID: 2644)
    • Changes the autorun value in the registry

      • DeepL.exe (PID: 496)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2820)
      • chrome.exe (PID: 2180)
      • DeepLSetup.exe (PID: 1776)
      • Update.exe (PID: 2736)
    • Reads Environment values

      • DeepL.exe (PID: 496)
      • DeepL.exe (PID: 2644)
    • Creates a software uninstall entry

      • DeepL.exe (PID: 496)
      • Update.exe (PID: 2736)
    • Adds / modifies Windows certificates

      • DeepL.exe (PID: 496)
      • DeepL.exe (PID: 2644)
    • Creates files in the program directory

      • DeepL.exe (PID: 496)
      • DeepL.exe (PID: 2644)
    • Creates files in the user directory

      • DeepL.exe (PID: 496)
    • Searches for installed software

      • Update.exe (PID: 2736)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2180)
      • chrome.exe (PID: 2820)
      • DeepL.exe (PID: 2644)
      • CefSharp.BrowserSubprocess.exe (PID: 2876)
    • Reads settings of System Certificates

      • chrome.exe (PID: 2180)
      • chrome.exe (PID: 2820)
    • Application launched itself

      • chrome.exe (PID: 2820)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2820)
    • Dropped object may contain Bitcoin addresses

      • Update.exe (PID: 2736)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
20
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs deeplsetup.exe update.exe deepl.exe deepl.exe cefsharp.browsersubprocess.exe cefsharp.browsersubprocess.exe cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496"C:\Users\admin\AppData\Local\DeepL\app-1.12.2\DeepL.exe" --squirrel-install 1.12.2C:\Users\admin\AppData\Local\DeepL\app-1.12.2\DeepL.exe
Update.exe
User:
admin
Company:
DeepL GmbH
Integrity Level:
MEDIUM
Description:
DeepL
Exit code:
0
Version:
1.12.2
Modules
Images
c:\users\admin\appdata\local\deepl\app-1.12.2\deepl.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1732"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1008,5807226762888257717,15424095242628835674,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=12010578128510912294 --mojo-platform-channel-handle=3948 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1776"C:\Users\admin\Downloads\DeepLSetup.exe" C:\Users\admin\Downloads\DeepLSetup.exe
chrome.exe
User:
admin
Company:
DeepL GmbH
Integrity Level:
MEDIUM
Description:
DeepL for Windows.
Exit code:
0
Version:
1.12.2
Modules
Images
c:\users\admin\downloads\deeplsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1972"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1008,5807226762888257717,15424095242628835674,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4490287910669378714 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2472 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2052"C:\Users\admin\AppData\Local\DeepL\app-1.12.2\x86\CefSharp.BrowserSubprocess.exe" --type=gpu-process --field-trial-handle=2392,3523843781818885888,4784639593754908598,131072 --disable-features=MimeHandlerViewInCrossProcessFrame --no-sandbox --log-file="C:\Users\admin\AppData\Local\DeepL\app-1.12.2\debug.log" --lang=en-US --cefsharpexitsub --gpu-preferences=KAAAAAAAAADgAAAwAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Users\admin\AppData\Local\DeepL\app-1.12.2\debug.log" --service-request-channel-token=6872465857066503984 --mojo-platform-channel-handle=2420 /prefetch:2 --host-process-id=2644C:\Users\admin\AppData\Local\DeepL\app-1.12.2\x86\CefSharp.BrowserSubprocess.exeDeepL.exe
User:
admin
Company:
The CefSharp Authors
Integrity Level:
MEDIUM
Description:
CefSharp.BrowserSubprocess
Exit code:
0
Version:
79.1.360.0
Modules
Images
c:\users\admin\appdata\local\deepl\app-1.12.2\x86\cefsharp.browsersubprocess.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2180"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,5807226762888257717,15424095242628835674,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=13937312914454058339 --mojo-platform-channel-handle=1564 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2460"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1008,5807226762888257717,15424095242628835674,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=10288072136259393804 --mojo-platform-channel-handle=1044 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2504"C:\Users\admin\AppData\Local\DeepL\app-1.12.2\x86\CefSharp.BrowserSubprocess.exe" --type=gpu-process --field-trial-handle=2392,3523843781818885888,4784639593754908598,131072 --disable-features=MimeHandlerViewInCrossProcessFrame --no-sandbox --log-file="C:\Users\admin\AppData\Local\DeepL\app-1.12.2\debug.log" --lang=en-US --cefsharpexitsub --gpu-preferences=KAAAAAAAAADgAAAwAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --log-file="C:\Users\admin\AppData\Local\DeepL\app-1.12.2\debug.log" --service-request-channel-token=2827049123625923105 --mojo-platform-channel-handle=2420 /prefetch:2 --host-process-id=2644C:\Users\admin\AppData\Local\DeepL\app-1.12.2\x86\CefSharp.BrowserSubprocess.exe
DeepL.exe
User:
admin
Company:
The CefSharp Authors
Integrity Level:
MEDIUM
Description:
CefSharp.BrowserSubprocess
Exit code:
4
Version:
79.1.360.0
Modules
Images
c:\users\admin\appdata\local\deepl\app-1.12.2\x86\cefsharp.browsersubprocess.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2644"C:\Users\admin\AppData\Local\DeepL\app-1.12.2\DeepL.exe" --squirrel-firstrunC:\Users\admin\AppData\Local\DeepL\app-1.12.2\DeepL.exe
Update.exe
User:
admin
Company:
DeepL GmbH
Integrity Level:
MEDIUM
Description:
DeepL
Exit code:
0
Version:
1.12.2
Modules
Images
c:\users\admin\appdata\local\deepl\app-1.12.2\deepl.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2736"C:\Users\admin\AppData\Local\SquirrelTemp\Update.exe" --install . C:\Users\admin\AppData\Local\SquirrelTemp\Update.exe
DeepLSetup.exe
User:
admin
Company:
GitHub
Integrity Level:
MEDIUM
Description:
Update
Exit code:
0
Version:
1.9.1.0
Modules
Images
c:\users\admin\appdata\local\squirreltemp\update.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
2 345
Read events
2 147
Write events
189
Delete events
9

Modification events

(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2860) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2820-13242922838920750
Value:
259
(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2820) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(2820) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2832-13239195546717773
Value:
0
Executable files
291
Suspicious files
87
Text files
115
Unknown types
146

Dropped files

PID
Process
Filename
Type
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF19113c.TMP
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\5a7e9e44-cb19-490f-bd03-b90962229d5b.tmp
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabsbinary
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF191330.TMP
MD5:
SHA256:
2820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RF1911c9.TMPtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
39
DNS requests
18
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2180
chrome.exe
216.58.206.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2180
chrome.exe
172.65.253.13:443
www.deepl.com
Cloudflare Inc
US
suspicious
2180
chrome.exe
216.58.208.45:443
accounts.google.com
Google Inc.
US
whitelisted
2180
chrome.exe
104.18.11.234:443
static.deepl.com
Cloudflare Inc
US
unknown
2180
chrome.exe
216.58.205.238:443
clients1.google.com
Google Inc.
US
whitelisted
2180
chrome.exe
172.65.226.29:443
s.deepl.com
Cloudflare Inc
US
suspicious
2180
chrome.exe
172.217.22.4:443
www.google.com
Google Inc.
US
whitelisted
2180
chrome.exe
216.58.205.234:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2180
chrome.exe
172.217.16.142:443
clients2.google.com
Google Inc.
US
whitelisted
2876
CefSharp.BrowserSubprocess.exe
172.65.253.13:443
www.deepl.com
Cloudflare Inc
US
suspicious

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 216.58.206.3
whitelisted
www.deepl.com
  • 172.65.253.13
suspicious
accounts.google.com
  • 216.58.208.45
shared
static.deepl.com
  • 104.18.11.234
  • 104.18.10.234
suspicious
s.deepl.com
  • 172.65.226.29
suspicious
clients1.google.com
  • 216.58.205.238
whitelisted
www.google.com
  • 172.217.22.4
malicious
appdownload.deepl.com
  • 62.138.14.29
suspicious
ssl.gstatic.com
  • 172.217.22.3
whitelisted
clients2.google.com
  • 172.217.16.142
whitelisted

Threats

No threats detected
Process
Message
DeepL.exe
Native library pre-loader is trying to load native SQLite library "C:\Users\admin\AppData\Local\DeepL\app-1.12.2\x86\SQLite.Interop.dll"...
DeepL.exe
Native library pre-loader is trying to load native SQLite library "C:\Users\admin\AppData\Local\DeepL\app-1.12.2\x86\SQLite.Interop.dll"...
CefSharp.BrowserSubprocess.exe
[0826/144438.870:ERROR:gl_surface_egl.cc(1115)] eglInitialize D3D11 failed with error EGL_NOT_INITIALIZED, trying next display type
CefSharp.BrowserSubprocess.exe
[0826/144438.870:ERROR:gl_surface_egl.cc(668)] EGL Driver message (Critical) eglInitialize: No available renderers.
CefSharp.BrowserSubprocess.exe
[0826/144439.909:ERROR:gl_surface_egl.cc(1115)] eglInitialize D3D9 failed with error EGL_NOT_INITIALIZED
CefSharp.BrowserSubprocess.exe
[0826/144439.909:ERROR:gl_initializer_win.cc(196)] GLSurfaceEGL::InitializeOneOff failed.
CefSharp.BrowserSubprocess.exe
[0826/144439.909:ERROR:gl_surface_egl.cc(668)] EGL Driver message (Critical) eglInitialize: No available renderers.
CefSharp.BrowserSubprocess.exe
[0826/144439.927:ERROR:viz_main_impl.cc(180)] Exiting GPU process due to errors during initialization
DeepL.exe
[0826/144440.100:WARNING:gpu_process_host.cc(1213)] The GPU process has crashed 1 time(s)
DeepL.exe
[0826/144440.989:WARNING:gpu_process_host.cc(982)] Reinitialized the GPU process after a crash. The reported initialization time was 166 ms