dialer.exe

  • File Path: C:\windows\SysWOW64\dialer.exe
  • Description: Microsoft Windows Phone Dialer

Screenshot

dialer.exe

Hashes

Type Hash
MD5 BC47097A8D4C5D6AD66F05CF438F5907
SHA1 81C429F292C4FD11168B425E60476ACFEAF14A67
SHA256 3694913609062FD45CCE3733EECAC8E6CF6B9100164D94218D378916CF86C6EC
SHA384 210FECA926B220A2AB1183AC906C15B4DDCCFD4E324D473A2D67D7EEA476FB6908077F8EFA4FBA9DD5987E2C9BE7D2B9
SHA512 EE2D28941C079F2B80547EC469067D4D647BBEE4022995F5BFB7632FC75FA4965FDCE73B73603DD84F8080C62F198FFE397973B69FF03FFAE3BDC034579F5E3D
SSDEEP 384:7856JZLXV44QE9yZhi82sBFd2k6eOpayE8vaXYoWepPocVfTDwzWttKWNdRVew:3Hbe4cZFFd2syE41GP7vwQxdRVew

Signature

  • Status: The file C:\windows\SysWOW64\dialer.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: ``
  • Thumbprint: ``
  • Issuer:
  • Subject:

File Metadata

  • Original Filename: DIALER.EXE.MUI
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 6.3.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of dialer.exe being misused. While dialer.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
LOLBAS Rasautou.yml Description: Windows Remote Access Dialer  

MIT License. Copyright (c) 2020-2021 Strontic.