Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
626b7a1be256b3bb0814746c9c37b0e6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
626b7a1be256b3bb0814746c9c37b0e6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
626b7a1be256b3bb0814746c9c37b0e6_JaffaCakes118.html
-
Size
20KB
-
MD5
626b7a1be256b3bb0814746c9c37b0e6
-
SHA1
05364e88c37f8ec87be27f60f6ac57f2312509f1
-
SHA256
49132184c82655e6519faf911293e767c1468ca1a82a66ed7143575177d9a986
-
SHA512
2957adfdca6bbdd9fd4f2d7e764e0c60d35f788e53f8cfb2e2b8cae3a59f96a82cff920558a5588084d29bc5666b48da68b210b23ce866070d583157f5a80e73
-
SSDEEP
384:rvKhh9XNZyrDmjAQWAVVH7P/O3uN0oXGwhzwRDIeX5vny:rvKhDdgmjAJAVVH7ncw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 4304 msedge.exe 4304 msedge.exe 1328 identity_helper.exe 1328 identity_helper.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2752 4304 msedge.exe 84 PID 4304 wrote to memory of 2752 4304 msedge.exe 84 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 1324 4304 msedge.exe 85 PID 4304 wrote to memory of 3776 4304 msedge.exe 86 PID 4304 wrote to memory of 3776 4304 msedge.exe 86 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87 PID 4304 wrote to memory of 2112 4304 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\626b7a1be256b3bb0814746c9c37b0e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd511b46f8,0x7ffd511b4708,0x7ffd511b47182⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1688 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10176663400871809275,16545655079429441590,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5332 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\371e89ba-1bda-4b59-8183-78baad0ddfac.tmp
Filesize5KB
MD57affc4bf493f2c30adfc851e7843f454
SHA12a0a3b33b3e5858e6e4c92d23319010c74ab4886
SHA256b7a018d2f239c92af43fe2052d553829d8697f405c3f7ae21d9dbb248b03b48c
SHA512e75be321eb4d71ec7d251e09ca8026a191e142d11f85b7571e465b114d3f65c5f457c7b553f3b725d5c81b9274288f0d2c789000531d6967032d6547918bdbbb
-
Filesize
6KB
MD5a04caa660c2bd849c48c1cdd0ff79ae8
SHA1dd6f51f30bbb12b87c37b24b6ef63585c2ff34c5
SHA2560c0aafd79b869bf1e2c65cd4237d76f3b9f83406bf589f7dffec8d7ab0d37362
SHA512a4bbc9a4685d937fd15b1e905d00758829ced42c85c659221a8813297adf9ff85f1e0602b78766a41bb86c4d1f18c8e35ea41da34bf63a771bed05506559b2fa
-
Filesize
6KB
MD58283177816486e27a39aa37fcb03fce8
SHA1a5eac416d4525657345eb243241cfb3773b8c54a
SHA256d585d425898083cb6874ac9eb92a3ac0ecdcdd0ab7769754f075aa129e2bb70a
SHA5122e1a8768ecd72780d2f4f18b350e01ea8262b6ad3d40fc9cb261d79b126d8571290ebc808e2c6abd357418596d12c4e13239bfde271a0aad255ffdf090b9d41f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD511dc900eb928a92ece08816b5e2366f1
SHA16811db5a87c957040538db540b1e3684a210e913
SHA256c52e3480ad55a6949ed27d53c18256d39f385e6b5c57da09fc6b650b64e57714
SHA5121f73e5c7478454b51963e6da4246574d5eb66b613a0dfd1b469fb967a5a2a38a7a1be6c398665456f27df529633c5e81400b996de915f35664322f8686aa0010