Overview
overview
7Static
static
7MirServer/...er.exe
windows7-x64
1MirServer/...er.exe
windows10-2004-x64
1MirServer/...te.exe
windows7-x64
1MirServer/...te.exe
windows10-2004-x64
1MirServer/...te.exe
windows7-x64
1MirServer/...te.exe
windows10-2004-x64
1MirServer/...30.exe
windows7-x64
1MirServer/...30.exe
windows10-2004-x64
1MirServer/...er.exe
windows7-x64
1MirServer/...er.exe
windows10-2004-x64
1MirServer/...ir.exe
windows7-x64
1MirServer/...ir.exe
windows10-2004-x64
1MirServer/...er.exe
windows7-x64
1MirServer/...er.exe
windows10-2004-x64
1MirServer/...rv.exe
windows7-x64
1MirServer/...rv.exe
windows10-2004-x64
1MirServer/...��.url
windows7-x64
1MirServer/...��.url
windows10-2004-x64
1MirServer/...��.exe
windows7-x64
1MirServer/...��.exe
windows10-2004-x64
1MirServer/...��.exe
windows7-x64
1MirServer/...��.exe
windows10-2004-x64
1MirServer/...�.html
windows7-x64
1MirServer/...�.html
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 00:06
Behavioral task
behavioral1
Sample
MirServer/GameLog/LogDataSrv/LogDataServer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MirServer/GameLog/LogDataSrv/LogDataServer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
MirServer/Gate_Server/LoginGate/LoginGate.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
MirServer/Gate_Server/LoginGate/LoginGate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
MirServer/Gate_Server/RunGate/RunGate.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
MirServer/Gate_Server/RunGate/RunGate.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
MirServer/Gate_Server/SelChrGate/Gate30.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
MirServer/Gate_Server/SelChrGate/Gate30.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
MirServer/Mir200/M2Server.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
MirServer/Mir200/M2Server.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
MirServer/Mir200/Mir.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
MirServer/Mir200/Mir.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
MirServer/Mud2/DBSrv200/DBServer.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
MirServer/Mud2/DBSrv200/DBServer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
MirServer/Mud2/LogSrv/LoginSrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MirServer/Mud2/LogSrv/LoginSrv.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
MirServer/上万免费版本下载基地.url
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
MirServer/上万免费版本下载基地.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
MirServer/我本沉默传奇启动程序.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
MirServer/我本沉默传奇启动程序.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
MirServer/我本沉默配套登陆器/我本沉默.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
MirServer/我本沉默配套登陆器/我本沉默.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
MirServer/说明文件/版本历史.html
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
MirServer/说明文件/版本历史.html
Resource
win10v2004-20240508-en
General
-
Target
MirServer/说明文件/版本历史.html
-
Size
10KB
-
MD5
faece19eaa753efe3a838e9973f97ac0
-
SHA1
276d6e0911cf37526f6d08ec248b1104bb92d478
-
SHA256
16291bd0d9ad925a2c8facf9888e4cf83559f9ada6c519f76b82d3696058804b
-
SHA512
2c552d30df1826e4fd7e72b04482bf51b0e30457c5b0abfac006470d0b2f3d28071e10b282a1e1f7de3e40b0c69a94a9b8b976dd74a6349ea198c7b1ce27ffc5
-
SSDEEP
192:7NnzqccckotaRz4Sk6X6aPrGHqs1xzI0GypEdTB1Gpz:5zOc9iA6X6aP6LkcpE9nGpz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 4596 msedge.exe 4596 msedge.exe 988 identity_helper.exe 988 identity_helper.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 384 4596 msedge.exe 83 PID 4596 wrote to memory of 384 4596 msedge.exe 83 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 2152 4596 msedge.exe 84 PID 4596 wrote to memory of 1028 4596 msedge.exe 85 PID 4596 wrote to memory of 1028 4596 msedge.exe 85 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86 PID 4596 wrote to memory of 4536 4596 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\MirServer\说明文件\版本历史.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf81746f8,0x7ffbf8174708,0x7ffbf81747182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,6482512491127326437,15005693606776479155,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD58e5ba6cdf310889dfb9a6001d7ec1fab
SHA1a370d0c84805e29dbd10df6055ccbf1a99d3ef09
SHA2567ec8c0183fee34531be431b7eb5da9dde1e16b52111ae1a9d0514c25359ef376
SHA512d77530164858bc73b4819b7d9b15f2d2fe363c622cb7ceee95d8f5ad69f7d29bfbd176ba51eb2121f015800319c57b5ea3225de11a422696d4b3d6a9b695c88f
-
Filesize
6KB
MD595a22063a922df6691528a2a8ecc9520
SHA198745122e5853bab60f1d3dbbce0623cbe9b0935
SHA256fbb008dd97d121d49f632771a20f30136e1e62cd3aa445c422e5cf9bd3ca32b0
SHA512b0854eafef71904f53fbc8935a11b128a7b6ee34614b210328afbef213a15e6168d9b2ba89ee68aed3fb261609359f68cd7d353c83602b30c544f771f4124682
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5588055a78184838ceca2f4563d064163
SHA182ecd98a44fe8889a380050c820a930fb3be92d5
SHA256bb7df259d419c1de49d3c0d21bf4243b3187b2b68827e7422e065d35635d97c8
SHA51241719250414aec1833261dd47aa9033b3015c7a9fdf32bcca677e3bcb2a5e8b68288d6afd1581e34a43b9304ab3e833f11aaad97f861be127819f21fc0ba675a