Skip to content

Object Directory

Evidence: Object Directory
Description: Collect Object Directory Information
Category: System
Platform: windows
Short Name: objdirinf
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

The Windows kernel maintains object directories that contain named kernel objects like devices, drivers, symbolic links, and other kernel-mode objects. These directories are organized hierarchically and can be enumerated to understand the kernel object namespace.

Common object directories include:

  • \Driver - Loaded driver objects
  • \Device - Device objects
  • \Global?? - Global symbolic links and DOS device names

Enumerating these directories can reveal hidden devices, suspicious drivers, and other kernel-level artifacts.

This collector gathers structured data about object directory.

FieldDescriptionExample
TypeObject typeDriver
PathObject path\Driver\Disk
TargetTarget path (for symbolic links)
TypeObject typeDevice
PathObject path\Device\HarddiskVolume3
TargetTarget path (for symbolic links)
TypeObject typeSymbolicLink
PathObject path\Global??\C:
TargetTarget path\Device\HarddiskVolume3

This collector uses kernel driver IOCTL calls:

  • IoctlCreateObjectDirectorySnapshot to snapshot the directory
  • IoctlEnumObjectDirectorySnapshot to enumerate objects
  • Processes three directories: \Driver, \Device, \Global??
  • Creates separate tables for each directory

Object directory enumeration helps detect kernel-level threats and hidden devices. Investigators use this data to identify hidden or suspicious drivers, detect rootkit device objects, track symbolic link manipulation, identify unusual kernel objects, verify driver object presence, and correlate with loaded driver enumeration.