ManageIQ/manageiq-smartstate

View on GitHub
lib/metadata/util/win32/Win32Accounts.rb

Summary

Maintainability
F
6 days
Test Coverage
F
7%
# encoding: US-ASCII

require 'manageiq/gems/pending'
require 'util/miq-xml'
require 'miq_unicode'

module MiqWin32
  using ManageIQ::UnicodeString

  class Accounts
    attr_reader :users, :groups

    def initialize(_c, fs)
      @users = []
      @groups = []

      # Extracted data also built into a human-readable format if uncommented
      # @debug_str = ''

      regHnd = RemoteRegistry.new(fs, true)
      reg_doc = regHnd.loadHive("sam", nil)
      regHnd.close

      # Collect a mapping of user SIDs to user names for user-group relationships
      users_by_sids = {}

      # Extract the users data from the registry
      @debug_str += "Users:\n" if @debug_str
      sections = [
        "HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Account\\Users",
        # "SAM/SAM/Domains/Builtin/Users"
      ]
      sections.each do |section|
        reg_node = MIQRexml.findRegElement("#{section}\\Names", reg_doc.root)
        if reg_node
          reg_node.each_element_with_attribute(:keyname) do |e|
            username = e.attributes[:keyname]
            user_data = {}
            @debug_str += "  %s:\n" % username if @debug_str

            e.each_element(:value) do |e2|
              @debug_str += "    %s - %s - %s\n" % [e2.attributes[:name], e2.attributes[:type], e2.text] if @debug_str

              # Find the rest of the user's data based on the hex value stored in the type
              reg_node2 = MIQRexml.findRegElement("#{section}/#{e2.attributes[:type]}", reg_doc.root)
              if reg_node2
                reg_node2.each_element(:value) do |e3|
                  @debug_str += "      %s - %s - %s\n" % [e3.attributes[:name], e3.attributes[:type], e3.text] if @debug_str
                  if e3.attributes[:name] == "F"
                    users_f = process_users_f(e3.text)

                    # Do a sanity check on the return data
                    if users_f.nil?
                      # Set the user_data to nil to signify a parsing problem
                      user_data = nil
                    elsif !user_data.nil?
                      user_data.merge!(users_f)
                    end
                  elsif e3.attributes[:name] == "V"
                    users_v = process_users_v(e3.text)

                    # Do a sanity check on the return data
                    if users_v.nil? || users_v['username'] != username
                      # Set the user_data to nil to signify a parsing problem
                      user_data = nil
                      $log.warn "Unable to process data for user account [#{username}]"
                    elsif !user_data.nil?
                      user_data.merge!(users_v)
                    end
                  end
                end
              end
            end

            # Get the pertinent data from out of that
            nh = {"name" => username}
            unless user_data.nil? || user_data.length == 0
              nh.merge!(
                "userid"       => user_data['user_num'],
                "display_name" => user_data['fullname'],
                "comment"      => user_data['comment'],
                "homedir"      => user_data['homedir'],
                "enabled"      => user_data['account_active'],
                "expires"      => user_data['account_expires'].nil? ? "never" : user_data['account_expires'],
                "last_logon"   => user_data['last_logon'],
                "groups"       => []
              )

              # Check for the SID in the permissions block by looking for a certain set of permissions.
              #   Checking is done in reverse, since the last permission set tends to be the right one.
              user_data['num_permissions'].downto(1) do |x|
                if user_data["perm#{x}_sid"] && ["D\000\002\000", "\004\000\002\000"].include?(user_data["perm#{x}_perms"])
                  users_by_sids[user_data["perm#{x}_sid"]] = nh['name']
                  break
                end
              end
            end
            @users << nh
          end
          @debug_str += "\n\n" if @debug_str
        end
      end

      # Extract the groups data from the registry
      @debug_str += "Groups:\n" if @debug_str
      sections = [
        "HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Builtin\\Aliases",
        # "SAM/SAM/Domains/Builtin/Groups",
        "HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Account\\Aliases",
        # "SAM/SAM/Domains/Account/Groups"
      ]
      sections.each do |section|
        reg_node = MIQRexml.findRegElement("#{section}\\Names", reg_doc.root)
        if reg_node
          reg_node.each_element_with_attribute(:keyname) do |e|
            groupname = e.attributes[:keyname]
            group_data = {}
            @debug_str += "  %s:\n" % groupname if @debug_str

            e.each_element(:value) do |e2|
              @debug_str += "    %s - %s - %s\n" % [e2.attributes[:name], e2.attributes[:type], e2.text] if @debug_str

              # Find the rest of the group's data based on the hex value stored in the type
              reg_node2 = MIQRexml.findRegElement("#{section}/#{e2.attributes[:type]}", reg_doc.root)
              if reg_node2
                reg_node2.each_element(:value) do |e3|
                  @debug_str += "      %s - %s - %s\n" % [e3.attributes[:name], e3.attributes[:type], e3.text] if @debug_str
                  if e3.attributes[:name] == "C"
                    groups_c = process_groups_c(e3.text)

                    # Do a sanity check on the return data
                    if groups_c.nil? || groups_c['group_name'] != groupname
                      # Set the group_data to nil to signify a parsing problem
                      group_data = nil
                    elsif !group_data.nil?
                      group_data.merge!(groups_c)
                    end
                  end
                end
              end
            end

            # Get the pertinent data from out of that
            nh = {"name" => groupname}
            unless group_data.nil? || group_data.length == 0
              nh.merge!(
                "groupid" => group_data['group_num'],
                "comment" => group_data['group_desc']
              )

              nh['users'] = []
              group_data['sids'].each do |sid|
                if users_by_sids.include?(sid)
                  # Add this user to the set of users for this group
                  nh['users'] << users_by_sids[sid]

                  # Add this group to the original user's set of groups
                  found = @users.find { |u| u['name'] == users_by_sids[sid] }
                  found['groups'] << nh['name'] if found
                end
              end
            end
            @groups << nh
          end
          @debug_str += "\n\n" if @debug_str
        end
      end

      # Force memory cleanup
      reg_doc = nil; GC.start

      # Dump the debug string to a file if we are collecting that data
      # File.open('C:/Temp/reg_extract_full_accounts.txt', 'w') { |f| f.write(@debug_str) } if @debug_str
    end

    def to_xml(doc = nil)
      doc = MiqXml.createDoc(nil) unless doc
      usersToXml(doc)
      groupsToXml(doc)
      doc
    end

    def usersToXml(doc = nil)
      doc = MiqXml.createDoc(nil) unless doc
      unless @users.empty?
        node = doc.add_element("users")
        @users.each do |u|
          u_groups = u.delete('groups')
          user = node.add_element("user", u)

          u_groups.each do |g|
            user.add_element('member_of_group', 'name' => g)
          end unless u_groups.nil?
        end
      end
      doc
    end

    def groupsToXml(doc = nil)
      doc = MiqXml.createDoc(nil) unless doc
      unless @groups.empty?
        node = doc.add_element("groups")
        @groups.each do |g|
          g_users = g.delete('users')
          group = node.add_element("group", g)

          g_users.each do |u|
            group.add_element('member_users', 'name' => u)
          end unless g_users.nil?
        end
      end
      doc
    end

    # Definition derived from http://www.beginningtoseethelight.org/ntsecurity/#8603CF0AFBB170DD
    # \HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\%RID%\F (fixed length, 80)
    SAM_STRUCT_USERS_F = [
      'a8',     nil,                    # UNKNOWN
      'Q',      'last_logon',           # Last logon (WinNT format), 0 if never logged on
      'a8',     nil,                    # UNKNOWN
      'Q',      'last_pw_set',          # Password last set (WinNT format), 0 if not changed
      'Q',      'account_expires',      # Account expires (WinNT format), 0 if set not to expire
      'Q',      'last_wrong_pw',        # Last incorrect password (WinNT format), 0 if not
      'I',      'user_num',             # User number
      'a4',     nil,                    # UNKNOWN
      'C',      'logon_ok_account_active',
      # High nibble
      #   Unsure - 0/2/6/8/A/C/E=pwd/username invalid
      #   1/3/4=logonokay
      #   5/7/D/F=Logon Message
      #     The system can not log you on due to the following error:
      #     The account used is an interdomain trust account. Use your global user
      #       account or local user account to access this server.
      #     Please try again or consult your system administrator.
      #   9/B=Logon Message
      #     The system can not log you on due to the following error:
      #     The account used is a computer account. Use your global user account
      #       or local user account to access this server.
      #     Please try again or consult your system administrator.
      # Low nibble
      #   Account active - 0=active 1=not active.
      #   Password required - 0=yes 4=no
      #   0/2/4/6/8/A/C/E=logonokay - 1/2/5/7/9/B/D/F=accountdisabled/inactive
      'C',      'pw_never_expire',      # High nibble
      #   UNKNOWN
      # Low nibble
      #   Password never expire - 0=secpoltime 2=never
      #   For some unknown reason this value is set to 4 on a lockout and 0 on
      #     unlocking. If the password is set never to expire the option to force
      #     the user to change their password on next logon is greyed out.
      #   2/3/6/7/A/B/E/F=Password never expires (2=GUI setting)
      #
      #   0/2/8/A=logonokay
      #   1/3/5/7/9/B/D/F=Logon Message
      #     The system can not log you on due to the following error:
      #     The account used is a server trust account. Use your global user
      #       account or local user account to access this server.
      #     Please try again or consult your system administrator.
      #   4/6/C/E=logonokay - reset to X-4 though.
      'a2',     nil,                    # UNKNOWN
      'S',      'country_code',         # Country code
      'a2',     nil,                    # UNKNOWN
      'S',      'invalid_pw_count',     # Invalid password count, reset after a correct logon
      'S',      'num_logons',           # Number of logons, gets stuck at FF,FF
    ]
    SIZEOF_SAM_STRUCT_USERS_F = BinaryStruct.sizeof(SAM_STRUCT_USERS_F)

    # Definition derived from http://www.beginningtoseethelight.org/ntsecurity/#D3BC3F5643A17823
    # \HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\%RID%\V (fixed length, 80)
    SAM_STRUCT_USERS_V_HEADER = [
      'a12',    nil,                    # UNKNOWN
      'I',      'username_offset',      # Offset to username in V data section
      'I',      'username_length',      # Length of username in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'fullname_offset',      # Offset to fullname in V data section
      'I',      'fullname_length',      # Length of fullname in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'comment_offset',       # Offset to comment in V data section
      'I',      'comment_length',       # Length of comment in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'user_comment_offset',  # Offset to user comment in V data section
      'I',      'user_comment_length',  # Length of user comment in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'unknown1_offset',      # Offset to unknown1 in V data section
      'I',      'unknown1_length',      # Length of unknown1 in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'homedir_offset',       # Offset to homedir in V data section
      'I',      'homedir_length',       # Length of homedir in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'homedir_conn_offset',  # Offset to homedir connect in V data section
      'I',      'homedir_conn_length',  # Length of homedir connect in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'script_path_offset',   # Offset to script path in V data section
      'I',      'script_path_length',   # Length of script path in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'profile_path_offset',  # Offset to profile path in V data section
      'I',      'profile_path_length',  # Length of profile path in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'workstations_offset',  # Offset to workstations in V data section
      'I',      'workstations_length',  # Length of workstations in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'hours_allowed_offset', # Offset to hours allowed in V data section
      'I',      'hours_allowed_length', # Length of hours allowed in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'unknown2_offset',      # Offset to unknown2 in V data section
      'I',      'unknown2_length',      # Length of unknown2 in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'LM_pw_hash_offset',    # Offset to LM pw hash in V data section
      'I',      'LM_pw_hash_length',    # Length of LM pw hash in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'NT_pw_hash_offset',    # Offset to NT pw hash in V data section
      'I',      'NT_pw_hash_length',    # Length of NT pw hash in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'unknown3_offset',      # Offset to unknown3 in V data section
      'I',      'unknown3_length',      # Length of unknown3 in V data section
      'a4',     nil,                    # UNKNOWN
      'I',      'unknown4_offset',      # Offset to unknown4 in V data section
      'I',      'unknown4_length',      # Length of unknown4 in V data section
      'a4',     nil,                    # UNKNOWN

      'a72',    nil,                    # UNKNOWN (WinXP, 2003, Vista, 2008)
      # 'a52',   nil,                    # UNKNOWN (Win2K)
      'I',      'num_permissions',      # Number of permissions
    ]
    SIZEOF_SAM_STRUCT_USERS_V_HEADER = BinaryStruct.sizeof(SAM_STRUCT_USERS_V_HEADER)

    # Definition derived from http://www.beginningtoseethelight.org/ntsecurity/#D98C08727B08B0CB
    # \HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Aliases\%RID%\C (variable length) (custom groups)
    # \HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000220\C (variable length) (builtin groups)
    SAM_STRUCT_GROUPS_C_HEADER = [
      'I',      'group_num',            # Group (user) number
      'a12',    nil,                    # UNKNOWN
      'I',      'group_name_offset',    # Offset to group name in C data section
      'I',      'group_name_length',    # Length of group name in C data section
      'a4',     nil,                    # UNKNOWN
      'I',      'group_desc_offset',    # Offset to group description in C data section
      'I',      'group_desc_length',    # Length of group description in C data section
      'a4',     nil,                    # UNKNOWN
      'I',      'sids_offset',          # Offset to sids in C data section
      'I',      'sids_length',          # Length of sids in C data section
      'I',      'num_users',            # Number of users in sids data
      'a72',    nil,                    # UNKNOWN (WinXP, 2003, Vista, 2008)
      # 'a52',   nil,                    # UNKNOWN (Win2K)
      'I',      'num_permissions',      # Number of permissions
    ]
    SIZEOF_SAM_STRUCT_GROUPS_C_HEADER = BinaryStruct.sizeof(SAM_STRUCT_GROUPS_C_HEADER)

    # Definition derived from http://www.beginningtoseethelight.org/ntsecurity/#3C091C8F1BF2345C and
    # http://www.beginningtoseethelight.org/ntsecurity/#B1945830FA4449A5
    SAM_STRUCT_SID_HEADER = [
      'C', 'part1',                     # First part of SID: S-[here]-?-...
      'C', 'num_sections',              # Number of 4-byte sections following second part of SID
      'a5', nil,                        # UNKNOWN
      'C', 'part2',                     # Second part of SID: S-?-[here]-...
    ]
    SIZEOF_SAM_STRUCT_SID_HEADER = BinaryStruct.sizeof(SAM_STRUCT_SID_HEADER)

    def self.rawBinaryToSids(data)
      sids = []
      while data && data.length > 0
        # Determine the full structure for this SID
        header = BinaryStruct.decode(data, SAM_STRUCT_SID_HEADER)
        sam_struct_sid_footer = []
        1.upto(header['num_sections']) { |x| sam_struct_sid_footer << 'I' << "section#{x}" }
        sam_struct_sid = [] + SAM_STRUCT_SID_HEADER + sam_struct_sid_footer

        # Get the parts and build the SID string
        sid_parts = BinaryStruct.decode(data, sam_struct_sid)
        sid = "S-#{sid_parts['part1']}-#{sid_parts['part2']}"
        'section1'.upto("section#{sid_parts['num_sections']}") do |x|
          break if sid_parts[x].nil?
          sid += '-' + sid_parts[x].to_s
        end
        sids << sid

        # Process the next SID
        data = data[BinaryStruct.sizeof(sam_struct_sid)..-1]
      end
      sids
    end

    def self.regBinaryToSid(data)
      rawBinaryToSids(MSRegHive.regBinaryToRawBinary(data))
    end

    def self.rawBinaryToRegBinary(a)
      b = ''
      a.each_byte { |c| b += "%02x," % c } unless a.nil?
      b.chop
    end

    def process_users_f(data)
      f = BinaryStruct.decode(MSRegHive.regBinaryToRawBinary(data), SAM_STRUCT_USERS_F)

      @debug_str += "        last_logon              - %s - " % f['last_logon'].to_s if @debug_str
      f['last_logon'] = process_users_f_date(f['last_logon'])
      @debug_str += "%s\n" % (f['last_logon'].nil? ? "Never" : f['last_logon']) if @debug_str

      @debug_str += "        last_pw_set             - %s - " % f['last_pw_set'].to_s if @debug_str
      f['last_pw_set'] = process_users_f_date(f['last_pw_set'])
      @debug_str += "%s\n" % (f['last_pw_set'].nil? ? "Not Change" : f['last_pw_set']) if @debug_str

      @debug_str += "        account_expires         - %s - " % f['account_expires'].to_s if @debug_str
      f['account_expires'] = process_users_f_date(f['account_expires'])
      @debug_str += "%s\n" % (f['account_expires'].nil? ? "Not set to expire" : f['account_expires']) if @debug_str

      @debug_str += "        last_wrong_pw           - %s - " % f['last_wrong_pw'].to_s if @debug_str
      f['last_wrong_pw'] = process_users_f_date(f['last_wrong_pw'])
      @debug_str += "%s\n" % (f['last_wrong_pw'].nil? ? "Not Wrong" : f['last_wrong_pw']) if @debug_str

      @debug_str += "        user_num                - %s\n" % f['user_num'].to_s if @debug_str

      @debug_str += "        logon_ok_account_active - 0x%02x\n" % f['logon_ok_account_active'] if @debug_str
      f['logon_ok'], f['account_active'] = process_users_f_logon_ok_account_active(f['logon_ok_account_active'])
      @debug_str += "          logon_ok              - %s\n" % f['logon_ok'].to_s if @debug_str
      @debug_str += "          account_active        - %s\n" % f['account_active'].to_s if @debug_str

      @debug_str += "        pw_never_expire         - 0x%02x\n" % f['pw_never_expire'] if @debug_str
      f['pw_never_expire'] = process_users_f_pw_never_expire(f['pw_never_expire'])
      @debug_str += "          pw_never_expire       - %s\n" % f['pw_never_expire'].to_s if @debug_str

      @debug_str += "        country_code            - %s - " % f['country_code'] if @debug_str
      f['country_code'] = process_users_f_country_code(f['country_code'])
      @debug_str += "%s\n" % (f['country_code'].nil? ? "Unknown" : f['country_code']) if @debug_str

      @debug_str += "        invalid_pw_count        - %s\n" % f['invalid_pw_count'].to_s if @debug_str
      @debug_str += "        num_logons              - %s\n" % f['num_logons'].to_s if @debug_str

      f
    end

    def process_users_f_date(date)
      date == 0 || date == 0x7FFFFFFFFFFFFFFF ? nil : MSRegHive.wtime2time(date)
    end

    def process_users_f_logon_ok_account_active(data)
      logon_ok = data >> 4
      logon_ok = case logon_ok
                 when 0, 2, 6, 8, 10, 12, 14 then false  # Username or Password invalid
                 when 1, 3, 4 then true                  # Logon OK
                 when 5, 7, 13, 15 then false            # Logon error message 1
                 when 9, 11 then false                   # Logon error message 2
                 end

      account_active = data & 0x0F
      account_active = case account_active
                       when 0 then true                        # Active; Password Required; Logon OK
                       when 4 then true                        # Password Not Required; Logon OK
                       when 2, 6, 8, 10, 12, 14 then true      # Logon OK
                       when 1 then false                       # Not Active; Account Disabled / Inactive
                       when 3, 5, 7, 9, 11, 13, 15 then false  # Account Disabled / Inactive"
                       end

      return logon_ok, account_active
    end

    def process_users_f_pw_never_expire(data)
      pw_never_expire = data & 0x0F
      pw_never_expire = case pw_never_expire
                        when 0 then true                        # Secpol Time; Unlocking; Logon OK
                        when 2 then true                        # Never; GUI Setting; Password Never Expires; Logon OK
                        when 8 then true                        # Logon OK
                        when 10 then true                       # Password Never Expires; Logon OK
                        when 3, 7, 11, 15 then true             # Password Never Expires; Logon Error Message"
                        when 1, 5, 9, 13 then false             # Logon Error Message
                        when 6, 14 then true                    # Password Never Expires; Logon OK - Reset to X-4 though
                        when 4 then true                        # Lockout; Password Never Expires; Logon OK - Reset to X-4 though
                        when 12 then true                       # Logon OK - Reset to X-4 though
                        end

      pw_never_expire
    end

    def process_users_f_country_code(data)
      country_code = case data
                     when 0 then 'System Default'
                     when 1 then 'United States'
                     when 2 then 'Canada (French)'
                     when 3 then 'Latin America'
                     when 31 then 'Netherlands'
                     when 32 then 'Belgium'
                     when 33 then 'France'
                     when 34 then 'Spain'
                     when 39 then 'Italy'
                     when 41 then 'Switzerland'
                     when 44 then 'United Kingdom'
                     when 45 then 'Denmark'
                     when 46 then 'Sweden'
                     when 47 then 'Norway'
                     when 49 then 'Germany'
                     when 61 then 'Australia'
                     when 81 then 'Japan'
                     when 82 then 'Korea'
                     when 86 then 'China (PRC)'
                     when 88 then 'Taiwan'
                     when 99 then 'Asia'
                     when 351 then 'Portugal'
                     when 358 then 'Finland'
                     when 785 then 'Arabic'
                     when 972 then 'Hebrew'
                     end

      country_code
    end

    def process_users_v(data)
      bin = MSRegHive.regBinaryToRawBinary(data)
      header_size = SIZEOF_SAM_STRUCT_USERS_V_HEADER
      v = BinaryStruct.decode(bin[0...header_size], SAM_STRUCT_USERS_V_HEADER)

      if @debug_str
        @debug_str += "        Header:\n"
        @debug_str += "          username_offset      - 0x%08x\n" % v['username_offset']
        @debug_str += "          username_length      - %s\n" % v['username_length'].to_s
        @debug_str += "          fullname_offset      - 0x%08x\n" % v['fullname_offset']
        @debug_str += "          fullname_length      - %s\n" % v['fullname_length'].to_s
        @debug_str += "          comment_offset       - 0x%08x\n" % v['comment_offset']
        @debug_str += "          comment_length       - %s\n" % v['comment_length'].to_s
        @debug_str += "          user_comment_offset  - 0x%08x\n" % v['user_comment_offset']
        @debug_str += "          user_comment_length  - %s\n" % v['user_comment_length'].to_s
        @debug_str += "          unknown1_offset      - 0x%08x\n" % v['unknown1_offset']
        @debug_str += "          unknown1_length      - %s\n" % v['unknown1_length'].to_s
        @debug_str += "          homedir_offset       - 0x%08x\n" % v['homedir_offset']
        @debug_str += "          homedir_length       - %s\n" % v['homedir_length'].to_s
        @debug_str += "          homedir_conn_offset  - 0x%08x\n" % v['homedir_conn_offset']
        @debug_str += "          homedir_conn_length  - %s\n" % v['homedir_conn_length'].to_s
        @debug_str += "          script_path_offset   - 0x%08x\n" % v['script_path_offset']
        @debug_str += "          script_path_length   - %s\n" % v['script_path_length'].to_s
        @debug_str += "          profile_path_offset  - 0x%08x\n" % v['profile_path_offset']
        @debug_str += "          profile_path_length  - %s\n" % v['profile_path_length'].to_s
        @debug_str += "          workstations_offset  - 0x%08x\n" % v['workstations_offset']
        @debug_str += "          workstations_length  - %s\n" % v['workstations_length'].to_s
        @debug_str += "          hours_allowed_offset - 0x%08x\n" % v['hours_allowed_offset']
        @debug_str += "          hours_allowed_length - %s\n" % v['hours_allowed_length'].to_s
        @debug_str += "          unknown2_offset      - 0x%08x\n" % v['unknown2_offset']
        @debug_str += "          unknown2_length      - %s\n" % v['unknown2_length'].to_s
        @debug_str += "          LM_pw_hash_offset    - 0x%08x\n" % v['LM_pw_hash_offset']
        @debug_str += "          LM_pw_hash_length    - %s\n" % v['LM_pw_hash_length'].to_s
        @debug_str += "          NT_pw_hash_offset    - 0x%08x\n" % v['NT_pw_hash_offset']
        @debug_str += "          NT_pw_hash_length    - %s\n" % v['NT_pw_hash_length'].to_s
        @debug_str += "          unknown3_offset      - 0x%08x\n" % v['unknown3_offset']
        @debug_str += "          unknown3_length      - %s\n" % v['unknown3_length'].to_s
        @debug_str += "          unknown4_offset      - 0x%08x\n" % v['unknown4_offset']
        @debug_str += "          unknown4_length      - %s\n" % v['unknown4_length'].to_s
        @debug_str += "          num_permissions      - %s\n" % v['num_permissions'].to_s
      end

      # Build middle section based on the num_permissions
      sam_struct_users_v_middle = []

      # Do a sanity check for the permissions section
      return nil if v['num_permissions'] > 100 || v['num_permissions'] <= 0

      sect_start = header_size
      'perm1'.upto("perm#{v['num_permissions']}") do |sect_name|
        bin_data = bin[sect_start + 2...sect_start + 4]
        return nil if bin_data.nil?
        sect_size = bin_data.unpack('S')[0]

        sam_struct_users_v_middle += [
          'a2',                 nil,                    # UNKNOWN
          'S',                  "#{sect_name}_length",  # Length of block for permissions?
          'a4',                 "#{sect_name}_perms",   # Permissions
          "a#{sect_size - 8}",  "#{sect_name}_sid",     # SID
        ]

        sect_start += sect_size
      end

      sam_struct_users_v_middle += [
        'a16',    'admins_group_sidA',      # Administrators group SID
        'a16',    'admins_group_sidB',      # Administrators group SID again
      ]

      # Build footer section based on sizes in header section
      sam_struct_users_v_footer = [
        'a%d' % v['username_length'],                                                                 'username',
        'a%d' % (v['fullname_offset'] - v['username_offset'] - v['username_length']),      nil,
        'a%d' % v['fullname_length'],                                                                 'fullname',
        'a%d' % (v['comment_offset'] - v['fullname_offset'] - v['fullname_length']),      nil,
        'a%d' % v['comment_length'],                                                                  'comment',
        'a%d' % (v['user_comment_offset'] - v['comment_offset'] - v['comment_length']),       nil,
        'a%d' % v['user_comment_length'],                                                             'user_comment',
        'a%d' % (v['unknown1_offset'] - v['user_comment_offset'] - v['user_comment_length']),  nil,
        'a%d' % v['unknown1_length'],                                                                 'unknown1',
        'a%d' % (v['homedir_offset'] - v['unknown1_offset'] - v['unknown1_length']),      nil,
        'a%d' % v['homedir_length'],                                                                  'homedir',
        'a%d' % (v['homedir_conn_offset'] - v['homedir_offset'] - v['homedir_length']),       nil,
        'a%d' % v['homedir_conn_length'],                                                             'homedir_conn',
        'a%d' % (v['script_path_offset'] - v['homedir_conn_offset'] - v['homedir_conn_length']),  nil,
        'a%d' % v['script_path_length'],                                                              'script_path',
        'a%d' % (v['profile_path_offset'] - v['script_path_offset'] - v['script_path_length']),   nil,
        'a%d' % v['profile_path_length'],                                                             'profile_path',
        'a%d' % (v['workstations_offset'] - v['profile_path_offset'] - v['profile_path_length']),  nil,
        'a%d' % v['workstations_length'],                                                             'workstations',
        'a%d' % (v['hours_allowed_offset'] - v['workstations_offset'] - v['workstations_length']),  nil,
        'a%d' % v['hours_allowed_length'],                                                            'hours_allowed',
        'a%d' % (v['unknown2_offset'] - v['hours_allowed_offset'] - v['hours_allowed_length']), nil,
        'a%d' % v['unknown2_length'],                                                                 'unknown2',
        'a%d' % (v['LM_pw_hash_offset'] - v['unknown2_offset'] - v['unknown2_length']),      nil,
        'a%d' % v['LM_pw_hash_length'],                                                               'LM_pw_hash',
        'a%d' % (v['NT_pw_hash_offset'] - v['LM_pw_hash_offset'] - v['LM_pw_hash_length']),    nil,
        'a%d' % v['NT_pw_hash_length'],                                                               'NT_pw_hash',
        'a%d' % (v['unknown3_offset'] - v['NT_pw_hash_offset'] - v['NT_pw_hash_length']),    nil,
        'a%d' % v['unknown3_length'],                                                                 'unknown3',
        'a%d' % (v['unknown4_offset'] - v['unknown3_offset'] - v['unknown3_length']),      nil,
        'a%d' % v['unknown4_length'],                                                                 'unknown4',
      ]

      struct_sam_users_v = [] + SAM_STRUCT_USERS_V_HEADER + sam_struct_users_v_middle + sam_struct_users_v_footer
      v = BinaryStruct.decode(bin, struct_sam_users_v)

      @debug_str += "        Middle:\n" if @debug_str

      'perm1'.upto("perm#{v['num_permissions']}") do |sect_name|
        # Clean up the SID values
        v["#{sect_name}_sid"] = Accounts.rawBinaryToSids(v["#{sect_name}_sid"])[0]

        if @debug_str
          @debug_str += "          #{sect_name}_length#{' ' * (9 - sect_name.length + 5)}- %s\n" % v["#{sect_name}_length"].to_s
          @debug_str += "          #{sect_name}_perms#{' ' * (9 - sect_name.length + 6)}- %s\n" % Accounts.rawBinaryToRegBinary(v["#{sect_name}_perms"])
          @debug_str += "          #{sect_name}_sid#{' ' * (9 - sect_name.length + 8)}- %s\n" % v["#{sect_name}_sid"].to_s
        end
      end
      if @debug_str
        @debug_str += "          admins_group_sidA    - %s\n" % Accounts.rawBinaryToSids(v['admins_group_sidA'])
        @debug_str += "          admins_group_sidB    - %s\n" % Accounts.rawBinaryToSids(v['admins_group_sidB'])
      end

      # Clean up Unicode string fields
      v['username'].UnicodeToUtf8!.tr!("\0", "")
      v['username'] = nil if v['username'].length == 0
      v['fullname'].UnicodeToUtf8!.tr!("\0", "")
      v['fullname'] = nil if v['fullname'].length == 0
      v['comment'].UnicodeToUtf8!.tr!("\0", "")
      v['comment'] = nil if v['comment'].length == 0
      v['user_comment'].UnicodeToUtf8!.tr!("\0", "")
      v['user_comment'] = nil if v['user_comment'].length == 0
      v['homedir'].UnicodeToUtf8!.tr!("\0", "")
      v['homedir'] = nil if v['homedir'].length == 0
      v['homedir_conn'].UnicodeToUtf8!.tr!("\0", "")
      v['homedir_conn'] = nil if v['homedir_conn'].length == 0
      v['script_path'].UnicodeToUtf8!.tr!("\0", "")
      v['script_path'] = nil if v['script_path'].length == 0
      v['profile_path'].UnicodeToUtf8!.tr!("\0", "")
      v['profile_path'] = nil if v['profile_path'].length == 0
      v['workstations'].UnicodeToUtf8!.tr!("\0", "")
      v['workstations'] = nil if v['workstations'].length == 0

      if @debug_str
        @debug_str += "        Footer:\n"
        @debug_str += "          username             - '%s'\n" % v['username']
        @debug_str += "          fullname             - '%s'\n" % v['fullname']
        @debug_str += "          comment              - '%s'\n" % v['comment']
        @debug_str += "          user_comment         - '%s'\n" % v['user_comment']
        @debug_str += "          unknown1             - '%s'\n" % v['unknown1']
        @debug_str += "          homedir              - '%s'\n" % v['homedir']
        @debug_str += "          homedir_conn         - '%s'\n" % v['homedir_conn']
        @debug_str += "          script_path          - '%s'\n" % v['script_path']
        @debug_str += "          profile_path         - '%s'\n" % v['profile_path']
        @debug_str += "          workstations         - '%s'\n" % v['workstations']
        @debug_str += "          hours_allowed        - '%s'\n" % v['hours_allowed']
        @debug_str += "          unknown2             - '%s'\n" % v['unknown2']
        @debug_str += "          LM_pw_hash           - %s\n" % Accounts.rawBinaryToRegBinary(v['LM_pw_hash'])
        @debug_str += "          NT_pw_hash           - %s\n" % Accounts.rawBinaryToRegBinary(v['NT_pw_hash'])
        @debug_str += "          unknown3             - '%s'\n" % v['unknown3']
        @debug_str += "          unknown4             - '%s'\n" % v['unknown4']

        @debug_str += "\n\n"
      end

      v
    end

    def process_groups_c(data)
      bin = MSRegHive.regBinaryToRawBinary(data)
      header_size = SIZEOF_SAM_STRUCT_GROUPS_C_HEADER
      c = BinaryStruct.decode(bin, SAM_STRUCT_GROUPS_C_HEADER)

      if @debug_str
        @debug_str += "        Header:\n"
        @debug_str += "          group_num         - %s\n" % c['group_num']
        @debug_str += "          group_name_offset - 0x%08x\n" % c['group_name_offset']
        @debug_str += "          group_name_length - %s\n" % c['group_name_length']
        @debug_str += "          group_desc_offset - 0x%08x\n" % c['group_desc_offset']
        @debug_str += "          group_desc_length - %s\n" % c['group_desc_length']
        @debug_str += "          sids_offset       - 0x%08x\n" % c['sids_offset']
        @debug_str += "          sids_length       - %s\n" % c['sids_length']
        @debug_str += "          num_users         - %s\n" % c['num_users']
        @debug_str += "          num_permissions   - %s\n" % c['num_permissions']
      end

      # Build middle section based on the num_permissions
      sam_struct_groups_c_middle = []

      # Do a sanity check for the permissions section
      return nil if c['num_permissions'] > 100 || c['num_permissions'] <= 0

      sect_start = header_size
      'perm1'.upto("perm#{c['num_permissions']}") do |sect_name|
        sect_size = bin[sect_start + 2...sect_start + 4].unpack('S')[0]

        sam_struct_groups_c_middle += [
          'a2',                 nil,                    # UNKNOWN
          'S',                  "#{sect_name}_length",  # Length of block for permissions?
          'a4',                 "#{sect_name}_perms",   # Permissions
          "a#{sect_size - 8}",  "#{sect_name}_sid",     # SID
        ]

        sect_start += sect_size
      end

      sam_struct_groups_c_middle += [
        'a16',    'admins_group_sidA',      # Administrators group SID
        'a16',    'admins_group_sidB',      # Administrators group SID again
      ]

      # Build footer section based on sizes in header section
      sam_struct_groups_c_footer = [
        'a%d' % c['group_name_length'],                                                     'group_name',
        'a%d' % (c['group_desc_offset'] - c['group_name_offset'] - c['group_name_length']), nil,
        'a%d' % c['group_desc_length'],                                                     'group_desc',
        'a%d' % (c['sids_offset'] - c['group_desc_offset'] - c['group_desc_length']), nil,
        'a%d' % c['sids_length'],                                                           'sids'
      ]

      sam_struct_groups_c = [] + SAM_STRUCT_GROUPS_C_HEADER + sam_struct_groups_c_middle + sam_struct_groups_c_footer
      c = BinaryStruct.decode(bin, sam_struct_groups_c)

      @debug_str += "        Middle:\n" if @debug_str
      'perm1'.upto("perm#{c['num_permissions']}") do |sect_name|
        # Clean up the SID values
        c["#{sect_name}_sid"] = Accounts.rawBinaryToSids(c["#{sect_name}_sid"])[0]

        if @debug_str
          @debug_str += "          #{sect_name}_length#{' ' * (9 - sect_name.length + 2)}- %s\n" % c["#{sect_name}_length"].to_s
          @debug_str += "          #{sect_name}_perms#{' ' * (9 - sect_name.length + 3)}- %s\n" % Accounts.rawBinaryToRegBinary(c["#{sect_name}_perms"])
          @debug_str += "          #{sect_name}_sid#{' ' * (9 - sect_name.length + 5)}- %s\n" % c["#{sect_name}_sid"].to_s
        end
      end
      if @debug_str
        @debug_str += "          admins_group_sidA - %s\n" % Accounts.rawBinaryToSids(c['admins_group_sidA'])
        @debug_str += "          admins_group_sidB - %s\n" % Accounts.rawBinaryToSids(c['admins_group_sidB'])
      end

      # Clean up Unicode string fields
      c['group_name'].UnicodeToUtf8!.tr!("\0", "")
      c['group_name'] = nil if c['group_name'].length == 0
      c['group_desc'].UnicodeToUtf8!.tr!("\0", "")
      c['group_desc'] = nil if c['group_desc'].length == 0

      # Clean up SID values
      c['sids'] = Accounts.rawBinaryToSids(c['sids'])

      if @debug_str
        @debug_str += "        Footer:\n"
        @debug_str += "          group_name        - '%s'\n" % c['group_name']
        @debug_str += "          group_desc        - '%s'\n" % c['group_desc']
        @debug_str += "          sids              - #{c['sids'].length == 0 ? "None" : "%s#{"\n                              %s" * (c['sids'].length - 1)}" % c['sids']}\n"
        @debug_str += "\n\n"
      end

      c
    end
  end
end