seclogon.dll

Description: Secondary Logon Service DLL

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.3636

Architecture: 64-bit

Operating System: Windows NT

SHA256: 4fde516b5715a627e3dc2757f903875a

File Size: 32.0 KB

Uploaded At: Dec. 1, 2025, 7:38 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess

Exported Functions

  • SvcEntry_Seclogon (Ordinal: 1, Address: 0x27c0)
  • SvchostPushServiceGlobals (Ordinal: 2, Address: 0x2d80)

Imported DLLs & Functions

api-ms-win-core-crt-l1-1-0.dll
  • __C_specific_handler (Address: 0x180005800)
  • memset (Address: 0x180005808)
  • wcschr (Address: 0x1800057f8)
api-ms-win-core-crt-l2-1-0.dll
  • _initterm (Address: 0x180005820)
  • _initterm_e (Address: 0x180005818)
api-ms-win-core-delayload-l1-1-0.dll
  • DelayLoadFailureHook (Address: 0x180005830)
api-ms-win-core-delayload-l1-1-1.dll
  • ResolveDelayLoadedAPI (Address: 0x180005840)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x180005858)
  • SetLastError (Address: 0x180005850)
  • SetUnhandledExceptionFilter (Address: 0x180005868)
  • UnhandledExceptionFilter (Address: 0x180005860)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x180005878)
  • DuplicateHandle (Address: 0x180005880)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x1800058a0)
  • HeapAlloc (Address: 0x180005890)
  • HeapFree (Address: 0x180005898)
api-ms-win-core-heap-l2-1-0.dll
  • LocalAlloc (Address: 0x1800058b0)
  • LocalFree (Address: 0x1800058b8)
api-ms-win-core-io-l1-1-0.dll
  • CreateIoCompletionPort (Address: 0x1800058c8)
  • GetQueuedCompletionStatus (Address: 0x1800058d0)
api-ms-win-core-job-l2-1-0.dll
  • AssignProcessToJobObject (Address: 0x1800058e0)
  • CreateJobObjectW (Address: 0x1800058f8)
  • SetInformationJobObject (Address: 0x1800058f0)
  • TerminateJobObject (Address: 0x1800058e8)
api-ms-win-core-kernel32-legacy-l1-1-0.dll
  • UnregisterWait (Address: 0x180005908)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x180005918)
api-ms-win-core-memory-l1-1-0.dll
  • ReadProcessMemory (Address: 0x180005930)
  • WriteProcessMemory (Address: 0x180005928)
api-ms-win-core-processenvironment-l1-1-0.dll
  • GetCurrentDirectoryW (Address: 0x180005940)
api-ms-win-core-processthreads-l1-1-0.dll
  • CreateProcessAsUserW (Address: 0x180005980)
  • GetCurrentProcess (Address: 0x180005958)
  • GetCurrentProcessId (Address: 0x1800059a0)
  • GetCurrentThread (Address: 0x180005978)
  • GetCurrentThreadId (Address: 0x180005960)
  • InitializeProcThreadAttributeList (Address: 0x180005968)
  • OpenProcessToken (Address: 0x180005988)
  • OpenThreadToken (Address: 0x180005970)
  • ResumeThread (Address: 0x180005998)
  • TerminateProcess (Address: 0x180005990)
  • UpdateProcThreadAttribute (Address: 0x180005950)
api-ms-win-core-processthreads-l1-1-1.dll
  • OpenProcess (Address: 0x1800059b8)
  • SetProcessMitigationPolicy (Address: 0x1800059b0)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x1800059c8)
api-ms-win-core-rtlsupport-l1-1-0.dll
  • RtlCaptureContext (Address: 0x1800059e0)
  • RtlLookupFunctionEntry (Address: 0x1800059e8)
  • RtlVirtualUnwind (Address: 0x1800059d8)
api-ms-win-core-synch-l1-1-0.dll
  • CreateEventW (Address: 0x180005a00)
  • DeleteCriticalSection (Address: 0x1800059f8)
  • EnterCriticalSection (Address: 0x180005a20)
  • InitializeCriticalSection (Address: 0x180005a08)
  • LeaveCriticalSection (Address: 0x180005a18)
  • SetEvent (Address: 0x180005a10)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemTimeAsFileTime (Address: 0x180005a30)
  • GetTickCount (Address: 0x180005a38)
api-ms-win-core-threadpool-legacy-l1-1-0.dll
  • QueueUserWorkItem (Address: 0x180005a48)
api-ms-win-core-util-l1-1-0.dll
  • DecodePointer (Address: 0x180005a58)
  • EncodePointer (Address: 0x180005a60)
api-ms-win-security-base-l1-1-0.dll
  • GetTokenInformation (Address: 0x180005a90)
  • ImpersonateLoggedOnUser (Address: 0x180005a80)
  • PrivilegeCheck (Address: 0x180005a78)
  • RevertToSelf (Address: 0x180005a70)
  • SetTokenInformation (Address: 0x180005a88)
api-ms-win-service-core-l1-1-0.dll
  • RegisterServiceCtrlHandlerExW (Address: 0x180005aa8)
  • SetServiceStatus (Address: 0x180005aa0)
ntdll.dll
  • NtQueryInformationProcess (Address: 0x180005b08)
  • RtlAdjustPrivilege (Address: 0x180005ad8)
  • RtlAllocateAndInitializeSid (Address: 0x180005af0)
  • RtlCopySid (Address: 0x180005b18)
  • RtlFreeSid (Address: 0x180005af8)
  • RtlInitializeSid (Address: 0x180005b20)
  • RtlInitString (Address: 0x180005ab8)
  • RtlInitUnicodeString (Address: 0x180005b00)
  • RtlLengthRequiredSid (Address: 0x180005ae0)
  • RtlLengthSid (Address: 0x180005ae8)
  • RtlNtStatusToDosError (Address: 0x180005ac0)
  • RtlQueryEnvironmentVariable (Address: 0x180005ac8)
  • RtlSetEnvironmentVar (Address: 0x180005ad0)
  • RtlSidDominates (Address: 0x180005b28)
  • RtlSubAuthoritySid (Address: 0x180005b10)
RPCRT4.dll
  • I_RpcBindingIsClientLocal (Address: 0x1800057b8)
  • NdrServerCall2 (Address: 0x1800057d0)
  • NdrServerCallAll (Address: 0x1800057d8)
  • RpcImpersonateClient (Address: 0x1800057b0)
  • RpcRevertToSelfEx (Address: 0x1800057c8)
  • RpcServerRegisterIfEx (Address: 0x1800057e8)
  • RpcServerUnregisterIf (Address: 0x1800057c0)
  • RpcServerUseProtseqEpW (Address: 0x1800057e0)