× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fdfd5d5ad41da804e9f319b914a7afa3469a890b25c6fc23f88aa1ab7107073f
File name: emotet_e2_fdfd5d5ad41da804e9f319b914a7afa3469a890b25c6fc23f88aa1a...
Detection ratio: 39 / 64
Analysis date: 2019-03-22 21:40:29 UTC ( 2 months ago )
Antivirus Result Update
Acronis suspicious 20190322
Ad-Aware Trojan.Emotet.VN 20190322
AhnLab-V3 Trojan/Win32.Cerber.R192892 20190322
Arcabit Trojan.Emotet.VN 20190322
Avast Win32:DangerousSig [Trj] 20190322
AVG Win32:DangerousSig [Trj] 20190322
BitDefender Trojan.Emotet.VN 20190322
ClamAV Win.Malware.Emotet-6900425-0 20190322
Comodo Malware@#2985q3kbj2olt 20190322
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cyren W32/Trojan.TZRU-2873 20190322
DrWeb Trojan.Siggen8.18231 20190322
Emsisoft Trojan.Emotet (A) 20190322
Endgame malicious (high confidence) 20190322
ESET-NOD32 a variant of Win32/Kryptik.EWIN 20190322
Fortinet W32/Kryptik.GMRW!tr 20190322
GData Trojan.Emotet.VN 20190322
Ikarus Trojan-Banker.Emotet 20190322
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 0051d3931 ) 20190322
K7GW Trojan ( 0051d3931 ) 20190322
Kaspersky Trojan-Banker.Win32.Emotet.cqcl 20190322
Malwarebytes Trojan.Emotet 20190322
MAX malware (ai score=82) 20190322
McAfee Emotet-FMI!52F67E36F686 20190322
McAfee-GW-Edition Emotet-FMI!52F67E36F686 20190322
Microsoft Trojan:Win32/Emotet.AC!bit 20190322
eScan Trojan.Emotet.VN 20190322
NANO-Antivirus Trojan.Win32.Emotet.fofzmh 20190322
Palo Alto Networks (Known Signatures) generic.ml 20190322
Panda Trj/GdSda.A 20190322
Qihoo-360 Win32/Trojan.9ad 20190322
Rising Trojan.Kryptik!8.8 (CLOUD) 20190322
SentinelOne (Static ML) DFI - Suspicious PE 20190317
Sophos AV Mal/Emotet-Q 20190322
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMTH 20190322
VBA32 BScope.Malware-Cryptor.Emotet 20190322
ViRobot Trojan.Win32.Z.Emotet.361224.L 20190322
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cqcl 20190322
AegisLab 20190322
Alibaba 20190306
Antiy-AVL 20190322
Avast-Mobile 20190322
Avira (no cloud) 20190322
Babable 20180918
Baidu 20190318
Bkav 20190320
CAT-QuickHeal 20190322
CMC 20190321
Cybereason 20190109
eGambit 20190322
F-Secure 20190322
Jiangmin 20190322
Kingsoft 20190322
SUPERAntiSpyware 20190321
Symantec Mobile Insight 20190220
TACHYON 20190322
Tencent 20190322
TheHacker 20190322
TotalDefense 20190322
Trapmine 20190301
Trustlook 20190322
Yandex 20190321
Zillya 20190322
Zoner 20190322
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2003-2015 Glarysoft Ltd

Product Glary Utilities
Original name OneClickMaintenance.exe
Internal name OneClickMaintenance.exe
File version 5, 0, 0, 6
Description OneClickMaintenance
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 10:40 PM 3/22/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-20 09:07:58
Entry Point 0x000016D0
Number of sections 4
PE sections
Overlays
MD5 fc5b4b620d3046bbc67fbf39d4a90929
File type data
Offset 357888
Size 3336
Entropy 7.34
PE imports
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyA
RegCloseKey
RegSetValueExW
RegQueryInfoKeyW
RegQueryValueExA
RegEnumKeyExW
RegEnumKeyW
RegFlushKey
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_Replace
FlatSB_SetScrollInfo
ImageList_SetImageCount
Ord(17)
FlatSB_GetScrollInfo
_TrackMouseEvent
ImageList_DragMove
FlatSB_SetScrollProp
ImageList_Create
ImageList_GetDragImage
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_AddMasked
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
FlatSB_SetScrollPos
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
InitializeFlatSB
FlatSB_GetScrollPos
ImageList_DragShowNolock
ImageList_Remove
ImageList_Read
ImageList_Copy
ImageList_EndDrag
GetSaveFileNameW
GetOpenFileNameW
SetDIBits
GdiFixUpHandle
PlayEnhMetaFileRecord
GetTextMetricsW
SetMapMode
GetWindowOrgEx
ResizePalette
GetPaletteEntries
CombineRgn
GetObjectType
GdiGetBatchLimit
CopyEnhMetaFileW
GetTextExtentPoint32A
SetPixel
EndDoc
IntersectClipRect
AngleArc
GetTextFaceA
CopyEnhMetaFileA
GetTextExtentPointW
GdiEntry16
CreatePalette
CreateDIBitmap
GdiEntry10
GetDIBits
ExtCreateRegion
GetEnhMetaFileBits
StretchBlt
StretchDIBits
ArcTo
Pie
Arc
SetBkColor
SetWinMetaFileBits
SetRectRgn
GetDIBColorTable
DeleteEnhMetaFile
GetSystemPaletteEntries
OffsetRgn
EnumFontsW
GetCurrentPositionEx
TextOutA
CreateRectRgnIndirect
EnumFontsA
GetBitmapBits
GdiGetPageHandle
GetBrushOrgEx
ExcludeClipRect
CLIPOBJ_ppoGetPath
GdiGetDevmodeForPage
SetBkMode
BitBlt
CreateFontA
GetOutlineTextMetricsA
SetAbortProc
FrameRgn
CreateBrushIndirect
SelectPalette
GetFontData
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
CreatePolyPolygonRgn
SetPixelV
DeleteObject
CreatePenIndirect
GetTextFaceAliasW
PatBlt
CreatePen
GetMetaRgn
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
CreateFontIndirectW
StartPage
GetObjectW
CreateDCW
XFORMOBJ_iGetXform
GetEnhMetaFileDescriptionW
SetEnhMetaFileBits
SetPaletteEntries
SetDIBitsToDevice
RectVisible
GetStockObject
PlayEnhMetaFile
UnrealizeObject
GdiFlush
AddFontResourceExA
SelectClipRgn
RoundRect
GdiGetCodePage
GetWinMetaFileBits
RealizePalette
GetEnhMetaFileHeader
SetWindowOrgEx
EudcLoadLinkW
GetTextExtentPoint32W
StartDocA
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
CreateICW
MaskBlt
EngGradientFill
GetEnhMetaFilePaletteEntries
RestoreDC
GetPixel
CreateBitmap
CreateDIBSection
GdiSetBatchLimit
SetTextColor
ExtFloodFill
GetCurrentObject
EngAcquireSemaphore
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
ExtTextOutW
CreateCompatibleDC
PolyBezierTo
CreateFontW
SetStretchBltMode
PolyBezier
Chord
SetBrushOrgEx
CreateRectRgn
SelectObject
GetEnhMetaFilePixelFormat
CreateCompatibleBitmap
CreateSolidBrush
Polyline
DPtoLP
StartDocW
Ellipse
ImmSetCompositionFontA
ImmSetCompositionWindow
ImmNotifyIME
ImmGetCompositionStringA
ImmGetContext
ImmSetCompositionFontW
ImmSetCandidateWindow
ImmReleaseContext
ImmGetCompositionStringW
ImmAssociateContext
SetThreadLocale
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
FileTimeToSystemTime
EnumResourceLanguagesA
WaitForSingleObject
HeapDestroy
CreateTimerQueue
GetFileAttributesW
DuplicateHandle
SystemTimeToTzSpecificLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetDiskFreeSpaceExA
GetCurrentDirectoryW
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
GetEnvironmentStrings
ExitProcess
SetErrorMode
FreeEnvironmentStringsW
GetStringTypeExW
lstrcatW
GetLocaleInfoW
SetStdHandle
FindResourceExA
WideCharToMultiByte
LoadLibraryW
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
WriteFile
_lopen
GetSystemTimeAsFileTime
GetCommandLineA
HeapReAlloc
GetStringTypeW
CompareFileTime
GetThreadPriority
EnumDateFormatsW
GetOEMCP
LocalFree
FormatMessageW
ResumeThread
EnumCalendarInfoW
GetExitCodeProcess
InitializeCriticalSection
OutputDebugStringW
GlobalHandle
GetLogicalDriveStringsW
FindClose
TlsGetValue
QueryDosDeviceW
MoveFileW
SetFileAttributesW
GetStringTypeExA
OutputDebugStringA
GetCurrentThread
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InterlockedDecrement
GlobalFindAtomW
WriteProcessMemory
UpdateResourceW
FileTimeToDosDateTime
RemoveDirectoryW
TryEnterCriticalSection
IsDebuggerPresent
HeapAlloc
VerLanguageNameW
GetModuleFileNameA
SetConsoleOutputCP
LoadLibraryA
QueryPerformanceFrequency
GlobalAddAtomW
EnumResourceLanguagesW
SetThreadPriority
lstrcpynW
LoadLibraryExW
MultiByteToWideChar
TerminateJobObject
DeleteTimerQueueTimer
GetSystemPowerStatus
FlushInstructionCache
GetPrivateProfileStringW
FormatMessageA
GetModuleHandleA
GlobalMemoryStatus
InterlockedExchangeAdd
CreateThread
GetSystemDefaultUILanguage
MoveFileExW
GetSystemDirectoryW
CreatePipe
GetExitCodeThread
FlushFileBuffers
GlobalAddAtomA
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
ExitThread
HeapCreate
SetEnvironmentVariableA
WaitForMultipleObjectsEx
TerminateProcess
SearchPathW
WriteConsoleA
SetCurrentDirectoryW
EnumResourceNamesW
VirtualQuery
GetConsoleMode
VirtualQueryEx
FileTimeToLocalFileTime
SetEndOfFile
FlushViewOfFile
GetVersion
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
EnumResourceTypesW
lstrcmpiA
EndUpdateResourceW
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
GetVersionExA
lstrcmpiW
RtlUnwind
FreeLibrary
CopyFileW
GlobalSize
GetStartupInfoA
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
OpenProcess
CreateDirectoryA
DeleteFileA
GetDateFormatW
GetStartupInfoW
ReadProcessMemory
GetCPInfo
DeleteFileW
GlobalLock
GetProcessHeap
GetTempFileNameW
GetComputerNameW
GetProfileStringW
CompareStringW
lstrcpyW
BeginUpdateResourceW
GlobalReAlloc
GetModuleFileNameW
ExpandEnvironmentStringsW
lstrcmpA
FindNextFileW
CreateDirectoryW
lstrcpyA
CreateEventW
EnumResourceNamesA
ResetEvent
FindFirstFileW
IsValidLocale
lstrcmpW
GetUserDefaultLCID
CreateFileMappingW
GetProcessAffinityMask
GetTimeZoneInformation
CreateFileW
CreateEventA
GlobalFindAtomA
GetFileType
TlsSetValue
CreateFileA
GetCurrentThreadId
LeaveCriticalSection
LoadResource
GetLastError
LocalReAlloc
LCMapStringW
GetShortPathNameW
VirtualAllocEx
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
GetConsoleAliasesLengthW
LCMapStringA
EnumSystemLocalesW
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
lstrlenW
CreateProcessW
GetAtomNameA
SwitchToThread
SizeofResource
GetUserDefaultLangID
VirtualFreeEx
GetCurrentProcessId
CopyFileExA
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
EnumResourceTypesA
HeapSize
SetThreadAffinityMask
InterlockedCompareExchange
WritePrivateProfileStringW
SuspendThread
RaiseException
CompareStringA
UnhandledExceptionFilter
MapViewOfFile
TlsFree
SetFilePointer
GetFullPathNameW
ReadFile
ReadConsoleOutputCharacterW
GlobalFlags
CloseHandle
OpenMutexW
lstrcpynA
GetACP
GetModuleHandleW
FreeResource
GetCPInfoExW
GetFileAttributesExW
FindResourceA
FindResourceExW
GetLongPathNameW
CreateProcessA
SetCommConfig
GetLocalTime
IsValidCodePage
UnmapViewOfFile
DragQueryFileW
SHBrowseForFolderW
SHBindToParent
SHChangeNotify
Shell_NotifyIconW
ExtractAssociatedIconExA
SHBrowseForFolderA
SHQueryRecycleBinA
Shell_NotifyIcon
Ord(18)
SHLoadNonloadedIconOverlayIdentifiers
Ord(24)
SHInvokePrinterCommandW
SHCreateDirectoryExW
SHGetPathFromIDListW
ExtractIconEx
SHCreateDirectoryExA
ShellExecuteExW
SHEmptyRecycleBinA
SHGetFileInfoW
SHFileOperationW
WOWShellExecute
SHGetMalloc
SHGetIconOverlayIndexW
DragQueryFile
SHFormatDrive
DragAcceptFiles
SHGetDesktopFolder
Ord(153)
SHGetSpecialFolderPathA
ShellExecuteExA
SHCreateProcessAsUserW
Ord(680)
ShellAboutW
Ord(25)
SHGetDataFromIDListW
DragFinish
ShellExecuteW
ShellExecuteA
SHGetSpecialFolderLocation
Ord(16)
SHGetDataFromIDListA
SHGetPathFromIDList
SHGetFolderPathA
CommandLineToArgvW
DoEnvironmentSubstW
StrCmpNIW
StrStrIW
RedrawWindow
GetMessagePos
SetWindowRgn
LoadBitmapW
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
SetWindowPos
IsWindow
CountClipboardFormats
DispatchMessageA
EndPaint
WindowFromPoint
DrawIcon
CharUpperBuffW
SetMenuItemInfoW
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
SendMessageA
UnregisterClassW
GetClientRect
DefWindowProcW
GetDlgItemTextW
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
GetSysColor
LoadImageW
TrackPopupMenu
ClientToScreen
GetActiveWindow
GetWindowTextW
SetDlgItemTextW
EnumClipboardFormats
MsgWaitForMultipleObjects
ScrollWindow
DrawTextW
CopyImage
PtInRect
DrawEdge
GetParent
UpdateWindow
GetPropW
CharPrevW
SetClassLongW
EnumWindows
ShowWindow
DrawFrameControl
SetPropW
GetDesktopWindow
DefMDIChildProcW
IsCharAlphaW
PeekMessageW
SetWindowsHookExW
InsertMenuItemW
SetWindowPlacement
CharUpperW
PeekMessageA
ChildWindowFromPoint
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
ActivateKeyboardLayout
SetClipboardData
GetIconInfo
SetParent
RegisterClassW
IsZoomed
GetWindowPlacement
LoadStringW
SetWindowLongW
GetKeyboardLayoutList
DrawMenuBar
IsIconic
GetSubMenu
OpenClipboard
IsDialogMessageW
FillRect
EnumThreadWindows
MonitorFromPoint
CharNextA
GetSysColorBrush
IsWindowUnicode
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
GetMenuItemInfoW
IsChild
IsDialogMessageA
MapWindowPoints
RegisterWindowMessageW
GetMonitorInfoW
EmptyClipboard
SystemParametersInfoW
OffsetRect
SetFocus
GetScrollPos
GetKeyboardLayoutNameW
KillTimer
MapVirtualKeyW
SetTimer
GetClipboardData
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
SetMenuDefaultItem
SetCapture
ReleaseCapture
EnumChildWindows
GetScrollRange
GetMessageExtraInfo
CharLowerW
ShowOwnedPopups
SendDlgItemMessageW
PostMessageW
GetKeyNameTextW
EndDialog
CreateDialogParamW
DrawTextExW
WaitMessage
CreatePopupMenu
ShowCaret
DrawFocusRect
GetClassLongW
GetLastActivePopup
DrawIconEx
SetWindowTextW
GetDCEx
GetDlgItem
RemovePropW
CreateIconIndirect
ScreenToClient
SetKeyboardState
CreateIcon
GetKeyboardState
GetMenuItemCount
IsDlgButtonChecked
CheckDlgButton
GetMenuState
GetKeyboardLayout
LoadCursorW
GetSystemMenu
FindWindowExW
GetDC
InsertMenuW
SetForegroundWindow
ExitWindowsEx
GetMenuStringW
GetAsyncKeyState
CharLowerBuffW
IntersectRect
GetScrollInfo
GetTopWindow
HideCaret
FindWindowW
GetCapture
BeginPaint
MessageBeep
RemoveMenu
GetWindowThreadProcessId
ShowScrollBar
MessageBoxW
SendMessageW
RegisterClassExW
SetMenu
LoadIconW
DialogBoxParamW
LoadKeyboardLayoutW
MessageBoxA
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
SendMessageTimeoutW
MessageBoxIndirectW
MsgWaitForMultipleObjectsEx
DispatchMessageW
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
wvsprintfW
GetDoubleClickTime
DestroyIcon
EnumDisplayMonitors
wsprintfW
DefFrameProcW
IsWindowVisible
SetCursorPos
IsCharAlphaNumericW
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
InvalidateRect
wsprintfA
CharNextW
CallWindowProcW
GetClassNameW
DestroyWindow
TranslateMDISysAccel
GetClassInfoW
IsRectEmpty
GetCursor
GetFocus
CreateMenu
EnableWindow
CloseClipboard
CheckMenuItem
UnhookWindowsHookEx
SetCursor
CoInitializeEx
OleUninitialize
CoUninitialize
IsEqualGUID
OleInitialize
RevokeDragDrop
ReleaseStgMedium
CLSIDFromString
RegisterDragDrop
CoCreateInstance
DoDragDrop
StringFromCLSID
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
Number of PE resources by type
RT_ICON 14
RT_GROUP_ICON 3
RT_DIALOG 2
RT_STRING 1
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
CHINESE SIMPLIFIED 21
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.0.0.6

LanguageCode
Chinese (Simplified)

FileFlagsMask
0x003f

FileDescription
OneClickMaintenance

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Chinese (Simplified)

InitializedDataSize
57344

EntryPoint
0x16d0

OriginalFileName
OneClickMaintenance.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2003-2015 Glarysoft Ltd

FileVersion
5, 0, 0, 6

TimeStamp
2019:03:20 10:07:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
OneClickMaintenance.exe

ProductVersion
5.0.0.0

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Glarysoft Ltd

CodeSize
299520

ProductName
Glary Utilities

ProductVersionNumber
5.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 52f67e36f686328547cfe43c6f65b262
SHA1 d32e54be8b455cafbe7d3823ebc825dbb616d4b9
SHA256 fdfd5d5ad41da804e9f319b914a7afa3469a890b25c6fc23f88aa1ab7107073f
ssdeep
6144:8Bf46wO7HK3Uwo5VUg+4sEjoKnun1Knun1Knun1Knun1Knun1Knun1Knun1Knunr:If9oWVp2WOWOWOWOWOWOWOWOWDGFoPxo

authentihash b51e583ae78b3834f7b22ba8517267187ab5887b31d6b33fc188ce0d7fa7a715
imphash 6154995aa850c4af662db81d4bc9f2ae
File size 352.8 KB ( 361224 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-20 09:14:20 UTC ( 2 months, 1 week ago )
Last submission 2019-03-21 02:15:32 UTC ( 2 months, 1 week ago )
File names OneClickMaintenance.exe
emotet_e2_fdfd5d5ad41da804e9f319b914a7afa3469a890b25c6fc23f88aa1ab7107073f_2019-03-20__091502.exe_
5KlFN2.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs