Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://originalgatorgrip.com/
Resource
win10v2004-20240802-en
General
-
Target
https://originalgatorgrip.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133707262250854843" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1924 1916 chrome.exe 90 PID 1916 wrote to memory of 1924 1916 chrome.exe 90 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 1408 1916 chrome.exe 91 PID 1916 wrote to memory of 3956 1916 chrome.exe 92 PID 1916 wrote to memory of 3956 1916 chrome.exe 92 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93 PID 1916 wrote to memory of 2156 1916 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://originalgatorgrip.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff86666cc40,0x7ff86666cc4c,0x7ff86666cc582⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,827885956135931053,13533395444644757875,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,827885956135931053,13533395444644757875,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,827885956135931053,13533395444644757875,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,827885956135931053,13533395444644757875,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,827885956135931053,13533395444644757875,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3824,i,827885956135931053,13533395444644757875,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4624,i,827885956135931053,13533395444644757875,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:81⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5db681fc9d67ff6cc249a0f210f9a3ecb
SHA1682069b6a8d38b96968b872a7e8dae1728c4e0e8
SHA256016a9105807e4b437df7fb74a302dc77eddbcf24291e3b3f15c2151364f47481
SHA512cbdc2d2af79a4aa69a805a97b4f53b8ffc97645010e30cd6f2063b4d832760537e96d8b6753ec5e5501f747ba7bbba014da5f0e1242457663c0e6f3e4f6dcf70
-
Filesize
1KB
MD5657455d53031d68506012783df77020e
SHA1d5011d04c7289e80665dfa574a5019f6f8f23cfe
SHA25673024ce8a949125187005fd9e8da342f03c39321599177956fd64e3a254d2d3b
SHA512accc629500271464d30e1c0bc4b66992b5ccd62c7c0a28b812e3e4e56d95cf1a981a1db1bef9470d8ed9e72e4f319aebc194f33d358cd298d6afcc6531a423fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5c762377fa272de21fa53612f98460355
SHA1d13f47ba421bd35645f14de0269e0360526b1788
SHA256f248576bcf9ee937241148f8905c7e440b46e00df27ce78dd87ffd12ccd6bdbe
SHA512c831c3035b793c9b5761bc41edd9ca315846b42df0160acb636a025546b843095f6622cb350d4aea2118c51e20d5e9b4b66fc7daafdca1dd6d6a2a10f0417d76
-
Filesize
9KB
MD52b1a18ad7c8f408161570fe6cd6274cc
SHA149a9901085323155f1f1e2d10924821d6bad0f0b
SHA256c22ef62bbc66856706a0d5655bfecb55cdb77e9f1d0322f588d58d8d482f9174
SHA512ff8047825236b19ebf017f6c3d3e2cf222a84390bc27e9b174a9d1246b594f8055e49bc98c208ad98b8122c2951ff59a458e695a87d302fd73c5fe19b4bdaf7f
-
Filesize
9KB
MD5adfd0b759813e4a8f5ae08f38f020771
SHA10fed903078960b7dbd494dcb091f04e53439de4c
SHA2560f8c4eb808d142583f63a5764f6eb665f0d671060777f4c7d8ca9cc1a056aced
SHA5126666d17f4b975fd2eb0cad5f932c517f06c3b241e1875e09194852022ba35a3903765d8a5a31811b11f87ec9c347d2cdc97824a332a2af389369657fadca3092
-
Filesize
9KB
MD51941e6cba3b8ee9211b1545688acbd99
SHA1d2afebe471e3a195288cfd666b42396081ac6886
SHA256598d48f14cef40ba74aa837a1e055a248b3ebca9f12da1bc706919b64bd792ce
SHA512edbc8218592688eee87f94b771339dc3ce87db2160c8212a25f0e2aa73351c9df7a76155a14bda55815b62dee30d847d723bfde824a3c2c8f0498cf2199339b0
-
Filesize
9KB
MD517441c99e2fe50b981cf5fbc67f9c616
SHA14a1d68530638afa0e214e37a27b7872634968fa0
SHA256d72f55cd07db7503ff31fcc83814817633337825425b5fbcc99784699079cb46
SHA5121c26524c5fb211a27f4a24bc086b3921c8cf2a73b1f30bdb70b1c9a576ee7b21f44b2a9998b96cc379329b35bf408f00bee76d8397b7c66809483832196dc391
-
Filesize
9KB
MD58f57ecaf24a12562bf77a10a037ee410
SHA1a8d870e5150b4bd95517da0e14bfac9734403e5a
SHA2568f7c6746488826e5d3b6a0f3163a45590a6dd5df287a886e83857869d7f66048
SHA512b9aaa6106b1c038cd01ac77e93c5d98ea690833a35d62fe68d50d25c26330e99f95e3261ae2238920eb52eb77e38c8bb4c4e1f88c5613f7f44e6a1726afa30e3
-
Filesize
9KB
MD5dd690e4fd87ad53e30e702f1d5f5c101
SHA1986ed19537ebceabb771cbfde62a9c28f319d287
SHA256b7c80a613b4755550b27815c64506d252ac372d024174db80d2038e3705a7e48
SHA5126ab9d7d93e648fa63540bc47a169d8af24e8970eae9a7517b177c93f94dd9637725c861cadc8e5f73209444ffac9f81edc032908a0111931ee54dbf80e859dfa
-
Filesize
9KB
MD591125daed0eb36c30aa63f4b20365e30
SHA1d4ea3f7aa99f871748e5d76bf938059d151d22d8
SHA256d36fc385850b3659bb91266312f0861ac6ce6ee42ba377947a95477e1750b492
SHA512dce065ff18057faea02d1759d838bc3a9b084579b037511ed9732aea1da1f571d04e5c5dce5725e86b328879291f7cbcfaa5606520e7cbd4f330e9dcd4798185
-
Filesize
99KB
MD5f0616ccf2498304da5b17b35b700feeb
SHA17b98acff82911aed544226c0a21332467a1ac01b
SHA256902be6f25eaeaa0b3b08dd07d177a0dd4a6cac122456cb18a18276da64fd9030
SHA5121dbc148763b14d0a9f4dc92e863acfd03481b19deacd66658f6b6d04c20a44fc0b5978e7ae5e3266ec178a95821b01abe67632ecc5fe11255104922530ef76e3
-
Filesize
99KB
MD5dab488dc403757efb0c1362267ffd8ff
SHA100820758ded5ff93f5362b0c197b9d76ac22b5c4
SHA2567f595c215a1b011712b337776960087705a0b4bea6e44e6c7bce13eca1ddf3d4
SHA51244bb796bd18ab6c06585ff0bce8d80037e7b87c923a0035488b3a702dbb9e2bb377052ab609d83e1bdc85c09b927f8441e802db3796d4db60a2516fa438f3c5d