dialer.exe

  • File Path: C:\windows\system32\dialer.exe
  • Description: Microsoft Windows Phone Dialer

Screenshot

dialer.exe

Hashes

Type Hash
MD5 9FEC2291F505591E72571E0323E4F152
SHA1 C43858CB375412663A7D4E3409B783FBB7B6BD7C
SHA256 AD708ECFF2FF1740DAF220EA253A661E1339F469930699C527B148DFB2E8ED83
SHA384 DB3645026DAA1FA9CCC376D0BCC945C465A1417C9E53100B6CD3994DD680488DFB5850C1B55D427CC278C6A9418CFE40
SHA512 55AC8D8CEDFEC0721F52EF3DE2F5C55D40CEB78BF8435011FE7F745F38D00B63678DF825F732DC5BDB5D0E67040D35C9C5C04670ACD53E866AC5F45D9ADE2984
SSDEEP 768:TnMY366MQ1YAYJy40wtK2+z5b15HJuqAi2maiOi5PZrWVfxdR:IY3P1YAYIwtK515w42maiOi5PZrgxd

Signature

  • Status: The file C:\windows\system32\dialer.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: ``
  • Thumbprint: ``
  • Issuer:
  • Subject:

File Metadata

  • Original Filename: DIALER.EXE.MUI
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 6.3.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of dialer.exe being misused. While dialer.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
LOLBAS Rasautou.yml Description: Windows Remote Access Dialer  

MIT License. Copyright (c) 2020-2021 Strontic.