Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 08:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www1.mwk.com/machinery/forms/datashts/Revised l551aeds New Logo.xls
Resource
win10v2004-20240508-en
General
-
Target
http://www1.mwk.com/machinery/forms/datashts/Revised l551aeds New Logo.xls
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598036222749559" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 1976 4840 chrome.exe 81 PID 4840 wrote to memory of 1976 4840 chrome.exe 81 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 3748 4840 chrome.exe 84 PID 4840 wrote to memory of 428 4840 chrome.exe 85 PID 4840 wrote to memory of 428 4840 chrome.exe 85 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86 PID 4840 wrote to memory of 1560 4840 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www1.mwk.com/machinery/forms/datashts/Revised l551aeds New Logo.xls1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcaaf0ab58,0x7ffcaaf0ab68,0x7ffcaaf0ab782⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:22⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:82⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:12⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4276 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:12⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:82⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4584 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4388 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 --field-trial-handle=1924,i,12275063433333011404,1679131738614415246,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b4bdc4684af8c82fd19f9a68fe9bb871
SHA1beeb183af6cad8d25226fd9c59d0b5ddcaaa8c9a
SHA256b5fbb50a341de0377f2aae769dbf1ab5ba479f090d2ed3e195fb1ffb040611c4
SHA51254d7e172c3ddeebb69c0fb8a4dcc0c762b40d20baee2cf35aa74a0f647a9dba7cc4d966b90c938a29fca3998b2249d4d3d61e6115896ddad58331fa49af9ea39
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD59e2ba0370e753cb8350399c884cbd8ac
SHA157ad693e5fdb61b63da3785d553608797eced3f9
SHA2568e894ec137a537efcd82d132a921acd4721a97bae555a5c7e2bc0943d6c7df2e
SHA512bdbc36923cf50d60c07448b7fa696b8b3ea3ac675439e4e965463866e8194b61f2592e231560c850b955b186fee93a78b87d6f361b2b9c1233c044af679e5f4e
-
Filesize
257KB
MD506ddafb46cef7af65220034a15fa9bc4
SHA1be07e89d9ce2d20c089917320ae6c6531a76ac9b
SHA2564ff1c204327c0758dd7976a63d88f42e9a22c5d7b5c7203f3c0dc65f3aef677c
SHA512e0ff0e00726fe5f75656f9babc0065ef875bb17b857e75069fe2e398ad1125ff1f78716563bf7e52269cdceaeb14977ef5ab9aabcb97dfdc832de72752739322
-
Filesize
257KB
MD558ecdcea2095862623cece290b82bc18
SHA13e6100f3a8e310da14c7576a1dab253d6e947aca
SHA256c7c92012e71bd403ba73cbd975deef2a39fbbf2ff530d92d93bac182ac423db0
SHA5122a3d5b7307dc7ebaf9b110a764350c27f63b9b5e9791e8c77752c30e9d5b3726a7c4af5e10ab74120ec2ce30a1dcf71ea157bb3bace28d4b651e05f21618afbf
-
Filesize
257KB
MD56a83287e917a6351fe37b530e6158613
SHA1c2ccc9c4e78c92258daf7871442eb85903bfb890
SHA2565729ac46dfb889d3a2e937085dc97f1d845f9e31ba2ba8861c136b35bc2e81a8
SHA512b52ae6624342b2379817513584f1d1c9ba64a70b08afd41a8850d4eaddd3b9303155d35bde5e0ce4d45164a5baa0f848136bfcb32d64affbac3a84c09e8c5457
-
Filesize
277KB
MD5565de19f4da8d491d85b3a22f481785e
SHA16fb119ea5e0a9f878c8127493b44cd1af0c4f3c2
SHA256f0c21383467f7b6baf193dee634b28afea4e1ed2b1e12fe428f6787b46dadeba
SHA51275b8208d18047e42ccd8d100a37dcbbbe6416efc47ce1d29b9ba4a10d3b7c9519e0fef3845e0f165deb4025fcdf870d9400b36b8bc6e24ab9120bbbeecfe607f
-
Filesize
91KB
MD5b7e9ec23322770d8617af9ecad203276
SHA14033ab2b7bd9e86927de9acc9e17e678c009653d
SHA2561efbd6b27ef1e4197fbed61af922e3569bfebe53ae60b621e5efa120df657983
SHA512369bafe4d85739ce2e3b6e85bd1324eb7270f1f34922fd616a9d5e737d226561174d816ba9d6295077c6f282bade932e28f63e5b0226d71528c4a924e9bffd16
-
Filesize
88KB
MD568a7f563070c325e72af593b0a35a10b
SHA1a4c4299d209b265f12857ef960a13c02f20d1a09
SHA256b1d262277571e7a91a5e7ab450238e2553cc20b03493b1bfde4eccb83f86df91
SHA5125a625ac50f6c1ebfd311da04f214fdc2c7d5e3eb2e63a49112cac5651a0dd46c6a106fde469ffc45dc98c5d5979f555ee99b303a65ec4dca9409b5ba8aa1da38