Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

6.3.9600.16384 (winblue_rtm.130821-1623) 2.09%
6.2.9200.16384 (win8_rtm.120725-1247) 1.52%
6.1.7600.16385 (win7_rtm.090713-1255) 12.36%
6.1.7600.16385 (win7_rtm.090713-1255) 0.19%
6.1.7600.16385 (win7_rtm.090713-1255) 14.64%
6.1.7600.16385 (win7_rtm.090713-1255) 0.57%
6.0.6000.16386 (vista_rtm.061101-2205) 2.66%
6.0.6000.16386 (vista_rtm.061101-2205) 1.52%
6.0.6000.16386 (vista_rtm.061101-2205) 20.72%
5.2.3790.3959 (srv03_sp2_rtm.070216-1710) 0.19%
5.1.2600.5512 (xpsp.080413-2113) 33.84%
5.1.2600.5512 (xpsp.080413-2113) 0.19%
5.1.2600.3311 (xpsp.080212-0010) 0.38%
5.1.2600.3300 (xpsp.080125-2034) 0.19%
5.1.2600.3244 (xpsp.071030-1542) 0.19%
5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) 8.75%

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
SetTokenInformation, ImpersonateLoggedOnUser, CreateProcessAsUserW, RevertToSelf, RegisterServiceCtrlHandlerW, SetServiceStatus, OpenServiceW, DeleteService, OpenSCManagerW, CreateServiceW, CloseServiceHandle, ChangeServiceConfig2W, GetSecurityDescriptorDacl, GetAclInformation, GetLengthSid, InitializeAcl, GetAce, AddAccessAllowedAce, AddAce, InitializeSecurityDescriptor, EqualSid, GetTokenInformation, OpenThreadToken, AllocateAndInitializeSid, OpenProcessToken, SystemFunction041, SetSecurityDescriptorDacl, FreeSid, RegisterServiceCtrlHandlerExW, PrivilegeCheck, GetUserNameW
api-ms-win-service-core-l1-1-1.dll
SetServiceStatus, RegisterServiceCtrlHandlerExW
kernel32.dll
GetProcessHeap, LeaveCriticalSection, EnterCriticalSection, GetModuleHandleW, UnregisterWaitEx, DeleteCriticalSection, SetLastError, HeapAlloc, InitializeCriticalSection, GetQueuedCompletionStatus, TerminateProcess, RegisterWaitForSingleObject, QueueUserWorkItem, SetInformationJobObject, AssignProcessToJobObject, CreateJobObjectW, ResumeThread, GetCurrentProcess, ProcessIdToSessionId, OpenProcess, TerminateJobObject, DisableThreadLibraryCalls, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, UnhandledExceptionFilter, SetUnhandledExceptionFilter, LocalAlloc, LocalFree, HeapFree, ReadProcessMemory, DuplicateHandle, WriteProcessMemory, GetLastError, GetCurrentThread, CloseHandle, CreateIoCompletionPort, InterlockedCompareExchange, Sleep, InterlockedExchange, CreateEventW, UnregisterWait, SetEvent, UpdateProcThreadAttribute, InitializeProcThreadAttributeList, GetCurrentDirectoryW, ResolveDelayLoadedAPI, DelayLoadFailureHook
msvcrt.dll
DllMain
ntdll.dll
RtlInitString, RtlLengthSid, RtlAdjustPrivilege, NtQueryInformationProcess, RtlNtStatusToDosError, RtlInitUnicodeString, RtlSubAuthoritySid, RtlInitializeSid, RtlLengthRequiredSid, RtlCopySid, RtlAllocateAndInitializeSid, RtlSidDominates, RtlFreeSid, RtlQueryEnvironmentVariable, RtlSetEnvironmentVar
rpcrt4.dll
RpcRevertToSelfEx, I_RpcBindingIsClientLocal, RpcServerRegisterIfEx, RpcServerUseProtseqEpW, RpcServerUnregisterIf, RpcImpersonateClient, NdrServerCall2, RpcRaiseException
secur32.dll
LsaFreeReturnBuffer, LsaRegisterLogonProcess, LsaLookupAuthenticationPackage, LsaLogonUser, SeciFreeCallContext, SeciAllocateAndSetIPAddress, LsaDeregisterLogonProcess
user32.dll
LoadStringW, GetUserObjectSecurity, SetUserObjectSecurity
userenv.dll
UnloadUserProfile, DestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock
Export table
DllRegisterServer
DllUnregisterServer
SvcEntry_Seclogon
SvchostPushServiceGlobals

seclogon.dll

Secondary Logon Service DLL by Microsoft

Remove seclogon.dll
Version:   6.1.7600.16385 (win7_rtm.090713-1255)
MD5:   a59b3a4442c52060cc7a85293aa3546f
SHA1:   04f0228caa39a96e4d4e7b7605218534205e1bd8
SHA256:   1776d6dee51991149265aaf39e17065e301c5fa1ff4068653dc0010b9b27185d
This is a Windows system installed file with Windows File Protection (WFP) enabled.

Overview

seclogon.dll is loaded as dynamic link library that runs in the context of a process. This version is designed to run on Windows 7.

DetailsDetails

File name:seclogon.dll
Publisher:Microsoft Corporation
Product name:Secondary Logon Service DLL
Description:Microsoft® Windows® Operating System
Typical file path:C:\Windows\System32\seclogon.dll
Original name:SECLOGON.EXE
File version:6.1.7600.16385 (win7_rtm.090713-1255)
Product version:6.1.7600.16385
Size:21 KB (21,504 bytes)
Digital DNA
PE subsystem:Windows Console
File packed:No
Code language:Microsoft Visual C++
.NET CLR:No
More details

BehaviorsBehaviors

Hosted services
Runs as a shared service under the Windows svcHost
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'
  • Shared name is 'seclogon'

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Microsoft Windows XP 61.50%
Windows Vista Home Premium 19.00%
Windows Vista Home Basic 6.00%
Windows 8.1 Pro 3.00%
Windows Vista Business 3.00%
Windows 8.1 2.50%
Windows Vista Ultimate 1.50%
Windows 8 Pro 1.00%
Windows 7 Ultimate 1.00%
Windows 8 Enterprise Evaluation 0.50%
Windows 8 0.50%
Windows 8 Pro N 0.50%

Distribution by countryDistribution by country

United States installs about 52.36% of Secondary Logon Service DLL.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Dell 34.57%
Hewlett-Packard 10.70%
Toshiba 10.70%
Intel 9.88%
Sony 5.76%
ASUS 4.12%
GIGABYTE 4.12%
Compaq 4.12%
Lenovo 3.29%
American Megatrends 3.29%
Gateway 3.29%
Acer 2.88%
Sahara 2.06%
Alienware 0.41%
Packard Bell 0.41%
Samsung 0.41%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE