..and then he deleted something
..and his computer froze and never booted back up again. I love those stories about the Registry; the critical box gets hosed because Billy decides to start editing
the Registry on the fly, network scripts that delete some vital key and take down an entire department ..ignorance is bliss I suppose - but not always..
and certainly not where it concerns the systems Registry.
The Registry though, is just a kind of hierarchal database, storing varied information on the Operating System and installed components.
In the beginning, it was intended only to store configuration information for COM components,
but later became a vehicle for peripheral application storage in an attempt to reduce reliance on .ini files, and now.. it seems we are moving in yet another direction, back towards
modular design principles, with application data stored within the application assemblies. That not withstanding, the Registry will continue to be a core element in the Windows
Operating System for some time to come.
So what does a Registry cleaner do, and do I really need one? Primarily, what it does is path testing, whether it be paths in the file system, or links between elements within
the Registry itself. I realized this a few years ago, when it so happened that I needed a Registry cleaner.. A friend had a particularly nasty virus on her computer,
one that disabled the anti-virus, and set itself up with system level access. I managed to remove it, but after deleting its components, the networking no longer worked.
It had inserted itself into the networking stack, and without knowing what or where these entries were, I needed a Registry cleaner to fix it. The one I used cleared
it right up (though without purchasing it, I had to manually delete the entries.. which in turn led me to writing the first version of this application). It was then that
I began examining the match entries to try and figure out how these applications worked, and started understanding the complex relationship between various Registry entries.
I'm not going to bore you with some long essay on how the Registry works, there are plenty of tutorials on the internet, Wikipedia
has a good one. What I will do, is give you a mile high view of how this application works, if you want to understand it better, or expand on this application; some serious debugging
and reading of the class notes will be required..
Accessing the Registry using API
At the heart of this application is the Registry class cLightning
, something I wrote in VB6 many years ago, and translated to C# as one of my first
projects in this language. Most of the data types and Registry API in advapi.dll
are accessible with this class. There are also a number of useful methods like RunAs
, ShellOpen
, Rot13
, and access escalation routines.
Enumerating through hundreds of thousands of Registry keys requires a 'need for speed' approach, ergo the inbuilt Registry methods are simply out
of the question (at least a 2:1 speed advantage using PInvoke). There are individual methods for each data type:
public string ReadResourceDescriptor(ROOT_KEY RootKey, string SubKey, string Value)
{
UIntPtr hKey = UIntPtr.Zero;
uint pvSize = 1024;
uint pdwType = (uint)VALUE_TYPE.REG_FULL_RESOURCE_DESCRIPTOR;
byte[] bBuffer = new byte[1024];
string sRet = String.Empty;
try
{
if (RegOpenKeyEx(RootKey, SubKey, 0, KEY_READ, ref hKey) == ERROR_NONE)
{
if (RegQueryValueEx(hKey, Value, 0, ref pdwType,
ref bBuffer[0], ref pvSize) == ERROR_NONE)
for (int i = 0; i < (pvSize); i++)
{
sRet += bBuffer[i].ToString();
}
}
return sRet;
}
finally
{
if (hKey != UIntPtr.Zero)
RegCloseKey(hKey);
}
}
public bool WriteResourceDescriptor(ROOT_KEY RootKey,
string SubKey, string Value, byte[] Data)
{
UIntPtr hKey = UIntPtr.Zero;
uint pdwType = (uint)VALUE_TYPE.REG_FULL_RESOURCE_DESCRIPTOR;
try
{
if (RegOpenKeyEx(RootKey, SubKey, 0, KEY_WRITE, ref hKey) == ERROR_NONE)
{
if (RegSetValueEx(hKey, Value, 0, pdwType, ref Data[0],
(Data.GetUpperBound(0) + 1)) == ERROR_NONE)
return true;
}
return false;
}
finally
{
if (hKey != UIntPtr.Zero)
RegCloseKey(hKey);
}
}
..and methods for collecting keys and values into an array:
public ArrayList EnumKeys(ROOT_KEY RootKey, string SubKey)
{
uint keyLen = 255;
uint index = 0;
int ret = 0;
long lastWrite = 0;
UIntPtr hKey = UIntPtr.Zero;
StringBuilder keyName = new StringBuilder(255);
ArrayList keyList = new ArrayList();
try
{
if (RegOpenKeyEx(RootKey, SubKey, 0, KEY_ENUMERATE_SUB_KEYS, ref hKey) != ERROR_NONE)
return keyList;
do
{
keyLen = 255;
ret = RegEnumKeyEx(hKey, index, keyName, ref keyLen,
IntPtr.Zero, IntPtr.Zero, IntPtr.Zero, out lastWrite);
if (ret == ERROR_NONE)
{
keyList.Add(keyName.ToString());
}
index += 1;
}
while (ret == 0);
return keyList;
}
finally
{
if (hKey != UIntPtr.Zero)
RegCloseKey(hKey);
}
}
There are also routines that delete keys and values, test key existence, test for empty values, etc.
Beating a path..
By far the most challenging portion of this project was file and directory path testing. This is because there are literally half a dozen different ways to list the same path.
Unicode, psuedo paths, truncated, prefixed, postfixed.. an absolute nightmare. As you can imagine, it took some tweaking to eliminate false positives, first by testing the path with
a Regular Expression, then if the file could not be found, going through a number of path conversions and extraction methods:
private static Regex _regPath = new Regex(
@"([?a-z A-Z]:.*\\)([?\w.]+)", RegexOptions.IgnoreCase |
RegexOptions.CultureInvariant |
RegexOptions.IgnorePatternWhitespace |
RegexOptions.Compiled
);
private string CleanPath(string Path)
{
Match mc = _regPath.Match(Path);
if (mc.Success && FileExists(mc.Groups[0].Value))
{
return mc.Groups[0].Value;
}
else
{
return ExtractPath(Path);
}
}
private string ExtractPath(string Path)
{
string sp = Path.ToUpper();
if (!FileExists(sp) && IsFileCandidate(sp))
{
if (sp.Substring(1, 1) != CHR_COLAN)
{
sp = sp.Substring(sp.IndexOf(CHR_COLAN) - 1);
}
if (sp.Substring(3).Contains(STR_PATH))
{
sp = sp.Substring(sp.IndexOf(STR_PATH, 3) - 1);
}
foreach (string s in _aExtensions)
{
if (sp.Contains(s))
{
sp = sp.Substring(0, sp.IndexOf(s) + s.Length);
break;
}
}
if (sp.Contains(CHR_TILDE))
{
sp = GetLongName(sp);
}
}
return sp;
}
There's actually a number of other methods not shown, used as safety valves to ensure the correct path is tested, something you should step through if interested..
Scan steps
There are 12 phases, and a number of subscans in the scanning process, as taken from the class notes in cRegScan
:
Custom controls
Purpose: Test for valid software class registration and command paths (CLSID).
Scan 1 - CLSID
- Valid registration - HKEY_CLASSES_ROOT\CLSID\..\InProcSvr32(+)
- Typelib paths - HKEY_CLASSES_ROOT\..
- Appid paths - HKEY_CLASSES_ROOT\CLSID\... Val-AppID <-> HKEY_CLASSES_ROOT\AppID
Scan 2 - Interface
- Type lib paths - HKEY_CLASSES_ROOT\Interface\TypeLib <-> CLSID\TypeLib
- Interface paths - HKEY_CLASSES_ROOT\Interface\...\ProxyStubClsid32 <-> CLSID
Scan 3 - TypeLib
- Empty keys - HKEY_CLASSES_ROOT\TypeLib\..\HELPDIR
- Typelib paths - HKEY_CLASSES_ROOT\TypeLib\..\..\win32
Scan 4 - File extensions
- Empty ext keys - HKEY_CLASSES_ROOT\...
User software
- Purpose: Test for valid software paths
- Location: HKEY_CURRENT_USER\Software.
- Method: Collect all software keys from \Software branch, and scan for valid path entries.
System software
Purpose: Scan 1-5 -System Software Test for valid ID registrations.
- Test class names - HKEY_CLASSES_ROOT\.xxx DefVal <-> HKEY_CLASSES_ROOT\..
- Test clsid - HKEY_CLASSES_ROOT\..\CLSID DefVal <-> HKEY_CLASSES_ROOT\CLSID
- Object menu path - HKEY_CLASSES_ROOT\..\shell\edit\command
- Object open path - HKEY_CLASSES_ROOT\..\shell\open\command
- Object icon path - HKEY_CLASSES_ROOT\..\DefaultIcon
Fonts
- Location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts.
- References: From HKLM -> fonts folder.
- Method: Path testing for valid occurrence.
Help files
- Location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Help.
- Reference: From HKLM -> Help registration.
- Method: Path testing for valid occurrence.
Shared DLLs
- Location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs.
- Reference: From HKLM -> path test.
- Method: Path testing for valid occurrence.
Startup entries
- Location: 1) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Location: 2) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
- Location: 3) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
- References: From HKLM -> path test.
- Method: Path testing for valid occurrence.
Installed software
- Location: 1) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
- References: From HKLM -> path test.
- Method: Path testing for valid occurrence of uninstall strings.
Virtual devices
- Location: 1) HKEY_LOCAL_MACHINE\SYSTEM\ControlSet\Control\VirtualDeviceDrivers
- References: From HKLM -> fix for 16bit VDM value type mismatch.
- Method: Value type testing for VDM bug.
History and Start menu
- References: From HKLM -> scan for valid link paths.
- Method: Value type testing for valid entry
- Location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu\Programs
- Location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\...\OpenWithList | OpenWithProgids
- Location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU
- Location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\...\Count
Deep scan
- References: From HKLM -> scan for valid link paths
- Method: Value type testing for valid entry
- Location: HKEY_LOCAL_MACHINE\SOFTWARE
- Location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\...\Products
MRU lists
- References: From HKCU -> scan for valid link paths
- Method: Value type searchLocations: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
- Locations: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
- Locations: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
- Locations: HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5603
- Locations: HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5001
- Locations: HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5647
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\Windows\CurrentVersion\Applets\Wordpad\Recent File List"
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\Windows\CurrentVersion\Applets\Regedit\Favorites"
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\Windows\CurrentVersion\Applets\Regedit"
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\Windows\CurrentVersion\Applets\Paint\Recent File List"
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedMRU"
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\Windows\CurrentVersion\Explorer\Wallpaper\MRU"
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\MediaPlayer\Player\RecentFileList"
- Locations: HKEY_CURRENT_USER\"Software\Microsoft\MediaPlayer\Player\RecentURLList"
Yes, a little cryptic I know.. but basically all routines (except MRU, which is kind of a heuristic scan for MRU lists) are doing path testing in various areas of the Registry.
The control scan is the most complicated, it tests for paths to shell/edit/default/icon paths and IDs under a CLSID subkey, it also tests for valid type, proxy, and interface
registration UIDs associated with that class.
As an example, one of the control scan segments tests for registered type libraries under the HKEY_CLASSES_ROOT\Clsid{xxxx}\Typelib subkey:
The scanning engine compares this to the list of registered type libraries under the HKEY_CLASSES_ROOT\Typelib branch. If the type library UID is absent,
the scan reports this as an invalid entry. The same method is used for AppId, ProxyStub, etc.
The best way to get a handle on what all this does, is just spending time both stepping through the methods and examining the paths in Regedit to try and make the logical connections.
UAC and Virtualization
In yet another patch meant to address 30 years of security complacency, we now have file and Registry Virtualization. Essentially, it just redirects write requests to more secure
areas of the Registry or file system. This shouldn't affect the application scan though, because we are running under administrator credentials.
This is just one of those apps that has to run as administrator, because many areas of the Registry are now write protected under Vista/W7. This is accomplished
by changing the app.manifest requestedExecutionLevel
to:
<requestedExecutionLevel level="requireAdministrator" uiAccess="false" />
The application will also need to be published with an external compiler, as the VS Publisher will throw an error with this setting (apparently by design).
Breaks like the wind..
There used to be a website that had a repository of trojans, virii, worms, etc., available for download (long gone, no doubt sued into oblivion),
some exploits even had original source code. While writing a spyware scanner, I took the time to go through some of the more nefarious examples, learning
what I could about how they worked. What I took away from that experience was that some of the original authors were real hard-core programmers, and that
it took a great deal of knowledge of the low level Windows internals to pull off some of these exploits. So, I noticed while testing *this* application that
some of the entries were not being deleted. Checking those entries permissions via Regedit, I saw something new, the 'Trusted Installer' [service] has full control
of the key, with all other users, even System, having only read access. My first thought was.. did someone in Redmond finally figure out how to keep us from modifying
selected NTFS objects, even the Administrator? So, I clicked on the owner tab, changed the ownership to the Administrators group, and gave myself back full control
(and if you can do it in Regedit, you can do it in code). So, it makes me wonder.. who do they create these security controls for, I mean, if I (a humble amateur)
can subvert this easily, what is one of those hard-core cracker dudes going to think?
Anyways.. the first thing you need to do, is change the object's ownership:
public bool ChangeObjectOwnership(string ObjectName, SE_OBJECT_TYPE ObjectType)
{
bool success = false;
IntPtr pSidAdmin = IntPtr.Zero;
IntPtr pAcl = IntPtr.Zero;
string name = ObjectName;
SID_IDENTIFIER_AUTHORITY sidNTAuthority =
new SID_IDENTIFIER_AUTHORITY() { Value = new byte[] { 0, 0, 0, 0, 0, 5 } };
success = AllocateAndInitializeSid(ref sidNTAuthority,
(byte)2, SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, ref pSidAdmin);
if (ObjectName.StartsWith("HKEY_CLASSES_ROOT"))
{
name = ObjectName.Replace("HKEY_CLASSES_ROOT", "CLASSES_ROOT");
}
else if (ObjectName.StartsWith("HKEY_CURRENT_USER"))
{
name = ObjectName.Replace("HKEY_CURRENT_USER", "CURRENT_USER");
}
else if (ObjectName.StartsWith("HKEY_LOCAL_MACHINE"))
{
name = ObjectName.Replace("HKEY_LOCAL_MACHINE", "MACHINE");
}
else if (ObjectName.StartsWith("HKEY_USERS"))
{
name = ObjectName.Replace("HKEY_USERS", "USERS");
}
if (success)
{
EXPLICIT_ACCESS[] explicitAccesss = new EXPLICIT_ACCESS[1];
explicitAccesss[0].grfAccessPermissions = ACCESS_MASK.GENERIC_ALL;
explicitAccesss[0].grfAccessMode = ACCESS_MODE.SET_ACCESS;
explicitAccesss[0].grfInheritance = NO_INHERITANCE;
explicitAccesss[0].Trustee.TrusteeForm = TRUSTEE_FORM.TRUSTEE_IS_SID;
explicitAccesss[0].Trustee.TrusteeType = TRUSTEE_TYPE.TRUSTEE_IS_GROUP;
explicitAccesss[0].Trustee.ptstrName = pSidAdmin;
SetEntriesInAcl(1, ref explicitAccesss[0], IntPtr.Zero, out pAcl);
success = SetPrivilege(SE_TAKE_OWNERSHIP_NAME, true);
if (success)
{
int p = SetNamedSecurityInfo(name, ObjectType,
SECURITY_INFORMATION.OWNER_SECURITY_INFORMATION,
pSidAdmin, IntPtr.Zero, IntPtr.Zero, IntPtr.Zero);
success = SetPrivilege(SE_TAKE_OWNERSHIP_NAME, false);
if (success)
{
SetNamedSecurityInfo(name, ObjectType,
SECURITY_INFORMATION.DACL_SECURITY_INFORMATION,
IntPtr.Zero, IntPtr.Zero, pAcl, IntPtr.Zero);
}
}
}
if (pSidAdmin != IntPtr.Zero)
{
FreeSid(pSidAdmin);
}
if (pAcl != IntPtr.Zero)
{
LocalFree(pAcl);
}
return success;
}
private bool SetPrivilege(string privilege, bool allow)
{
bool success = false;
IntPtr token = IntPtr.Zero;
TOKEN_PRIVILEGES tokenPrivileges = new TOKEN_PRIVILEGES();
success = OpenProcessToken(GetCurrentProcess(),
(uint)TOKEN_PRIVILEGES_ENUM.TOKEN_ADJUST_PRIVILEGES |
(uint)TOKEN_PRIVILEGES_ENUM.TOKEN_QUERY, out token);
if (success)
{
if (allow)
{
LUID luid;
LookupPrivilegeValueA(null, privilege, out luid);
tokenPrivileges.PrivilegeCount = 1;
tokenPrivileges.Privileges = new LUID_AND_ATTRIBUTES[1];
tokenPrivileges.Privileges[0].Luid = luid;
tokenPrivileges.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
}
success = AdjustTokenPrivileges(token, false, ref tokenPrivileges, 0,
IntPtr.Zero, IntPtr.Zero);
}
if (token != IntPtr.Zero)
{
CloseHandle(token);
}
return success;
}
What we are doing here is modifying the access token of the current process to include the rights required to take ownership of an object, then changing
the object's owner. This happens if a value or key fails to be deleted.
Now it's not just enough to own the object, you also require the rights to modify or delete the object. This is accomplished by rebuilding the object's DACL,
or access control lists, a series of bitmasks compared to the users access token that determine the rights available to the process. The object's DACL is composed
of ACE entries, or Access Control Entries, individual bitmasks for read/write/execute etc. So what we need to do is rebuild the DACL and apply the new list to the object.
First the setup, get the account information including the user's SID, and the handle to the subkey to be altered:
public bool ChangeKeyPermissions(ROOT_KEY RootKey, string SubKey, string AccountName,
eRegistryAccess AccessMask, eAccessType AccessType, eInheritenceFlags Inheritence)
{
IntPtr lKey = IntPtr.Zero;
ACCOUNT_PERM tAccount = new ACCOUNT_PERM();
SID_IDENTIFIER_AUTHORITY tAuthority = new SID_IDENTIFIER_AUTHORITY();
try
{
tAccount.AccountName = "";
tAccount.AccessMask = (uint)ACCESS_MASK.GENERIC_READ;
tAccount.AceFlags = (byte)CONTAINER_INHERIT_ACE;
tAccount.AceType = (byte)ACCESS_ALLOWED_ACE_TYPE;
tAccount.pSid = IntPtr.Zero;
tAuthority.Value = new byte[] { 0, 0, 0, 0, 0, (byte)SECURITY_WORLD_SID_AUTHORITY };
if (AllocateAndInitializeSid(ref tAuthority, (byte)1,
(int)SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, ref tAccount.pSid) == true)
{
tAccount.AccountName = AccountName;
tAccount.AccessMask = (uint)AccessMask;
tAccount.AceFlags = (byte)Inheritence;
tAccount.AceType = (byte)AccessType;
tAccount.pSid = IntPtr.Zero;
tAccount.SidPassedByCaller = false;
if ((RegOpenKeyEx(RootKey, SubKey, 0, (int)(READ_CONTROL | WRITE_DAC), ref lKey) == 0))
{
return SetKeyPermissions(lKey, tAccount);
}
}
return false;
}
finally
{
if (lKey != IntPtr.Zero)
{
RegCloseKey(lKey);
}
if ((tAccount.pSid != IntPtr.Zero) && (tAccount.SidPassedByCaller == true))
{
FreeSid(tAccount.pSid);
tAccount.pSid = IntPtr.Zero;
}
}
}
Then create the security descriptor, and apply it to the Registry key:
private bool CreateKeyDescriptor(IntPtr pOldSD, ACCOUNT_PERM Account, ref MEM_DATA MemData)
{
bool bDefault = false;
bool bPresent = false;
int iControlBits = 0;
int iControlSet = 0;
int iDomain = 0;
int iFlag = 0;
int iLength = 0;
int iRevision = 0;
int iSidLen = 0;
int iTotal = 0;
int iUse = 0;
StringBuilder sDomain = new StringBuilder(256);
IntPtr pNewACL = IntPtr.Zero;
IntPtr pAcl = IntPtr.Zero;
IntPtr pSid = IntPtr.Zero;
IntPtr pPnt = IntPtr.Zero;
ACL_SIZE_INFORMATION tAclSize = new ACL_SIZE_INFORMATION();
ACL tTempACL = new ACL();
ACE tTempAce = new ACE();
try
{
MemData.pAcl = IntPtr.Zero;
MemData.pSd = IntPtr.Zero;
pSid = LocalAlloc(LMEM_INITIALIZED, SECURITY_DESCRIPTOR_MIN_LENGTH);
if (pSid == IntPtr.Zero)
{
return false;
}
MemData.pSd = pSid;
if (InitializeSecurityDescriptor(pSid, SECURITY_DESCRIPTOR_REVISION) == 0)
{
return false;
}
if (pOldSD != IntPtr.Zero)
{
if (GetSecurityDescriptorDacl(pOldSD, out bPresent, ref pAcl, out bDefault) == true)
{
if ((bPresent == true) && (pAcl != IntPtr.Zero))
{
if (GetAclInformation(pAcl, ref tAclSize, Marshal.SizeOf(tAclSize),
ACL_INFORMATION_CLASS.AclSizeInformation) == false)
{
return false;
}
else
{
iTotal = tAclSize.AclBytesInUse;
}
}
else
{
iTotal = Marshal.SizeOf(tTempACL);
}
}
else
{
return false;
}
}
if (Account.pSid == IntPtr.Zero)
{
iDomain = 256;
LookupAccountName(null, Account.AccountName, IntPtr.Zero,
ref iSidLen, sDomain, ref iDomain, out iUse);
Account.pSid = LocalAlloc(LMEM_INITIALIZED, iSidLen);
if (Account.pSid == IntPtr.Zero)
{
return false;
}
if (LookupAccountName(null, Account.AccountName, Account.pSid,
ref iSidLen, sDomain, ref iDomain, out iUse) == false)
{
return false;
}
}
iLength = (Marshal.SizeOf(tTempAce) + GetLengthSid(Account.pSid)) - 4;
iTotal += iLength;
pNewACL = LocalAlloc(LMEM_INITIALIZED, iTotal);
if (pNewACL == IntPtr.Zero)
{
return false;
}
MemData.pAcl = pNewACL;
if (InitializeAcl(pNewACL, iTotal, ACL_REVISION) == false)
{
return false;
}
if (Account.AceType == ACCESS_DENIED_ACE_TYPE)
{
if (BuildACE(pNewACL, Account.AceType, Account.AceFlags,
Account.AccessMask, Account.pSid) == false)
{
return false;
}
}
if ((bPresent == true) && (pAcl != IntPtr.Zero) && (tAclSize.AceCount > 0))
{
for (int count = 0; count < tAclSize.AceCount; count++)
{
GetAce(pAcl, count, out pPnt);
if (pPnt == IntPtr.Zero)
{
return false;
}
RtlMoveMemory(ref tTempAce, pPnt, Marshal.SizeOf(tTempAce));
if (((int)tTempAce.Header.AceFlags & INHERITED_ACE) == INHERITED_ACE)
{
break;
}
int x = (int)pPnt + 8;
IntPtr pPt = new IntPtr(x);
if (!SidIsEqual(Account.pSid, pPt))
{
AddAce(pNewACL, ACL_REVISION, MAXDWORD, pPnt, tTempAce.Header.AceSize);
}
}
}
if (Account.AceType == ACCESS_ALLOWED_ACE_TYPE)
{
BuildACE(pNewACL, Account.AceType, Account.AceFlags, Account.AccessMask, Account.pSid);
}
if ((bPresent == true) && (pAcl != IntPtr.Zero) && (tAclSize.AceCount > 0))
{
for (int count = 0; count < tAclSize.AceCount; count++)
{
GetAce(pAcl, count, out pPnt);
RtlMoveMemory(ref tTempAce, pPnt, Marshal.SizeOf(tTempAce));
AddAce(pNewACL, ACL_REVISION, MAXDWORD, pPnt, tTempAce.Header.AceSize);
}
}
if (pOldSD != IntPtr.Zero)
{
if (GetSecurityDescriptorControl(pOldSD, out iFlag, out iRevision) != 0)
{
if ((iFlag & SE_DACL_AUTO_INHERITED) == SE_DACL_AUTO_INHERITED)
{
iControlBits = SE_DACL_AUTO_INHERIT_REQ | SE_DACL_AUTO_INHERITED;
iControlSet = iControlBits;
}
else if ((iFlag & SE_DACL_PROTECTED) == SE_DACL_PROTECTED)
{
iControlBits = SE_DACL_PROTECTED;
iControlSet = iControlBits;
}
if (iControlSet != 0)
{
SetSecurityDescriptorControl(pSid, iControlBits, iControlSet);
}
}
}
return SetSecurityDescriptorDacl(pSid, 1, pNewACL, 0);
}
finally
{
if (Account.pSid != IntPtr.Zero)
{
LocalFree(Account.pSid);
Account.pSid = IntPtr.Zero;
}
}
}
private bool BuildACE(IntPtr lAclId, byte bType, byte bFlags, uint lMask, IntPtr lPointer)
{
int iAceLen = 0;
int iSidLen = 0;
IntPtr pAce = IntPtr.Zero;
ACE tTempAce = new ACE();
try
{
iSidLen = GetLengthSid(lPointer);
iAceLen = Marshal.SizeOf(tTempAce) + iSidLen - 4;
pAce = LocalAlloc(LMEM_INITIALIZED, iAceLen);
if (pAce != IntPtr.Zero)
{
tTempAce.Header = new ACE_HEADER();
tTempAce.Header.AceType = bType;
tTempAce.Header.AceFlags = bFlags;
tTempAce.Header.AceSize = (short)iAceLen;
tTempAce.Mask = (int)lMask;
int dDt = (int)pAce + 8;
IntPtr pDt = new IntPtr(dDt);
RtlMoveMemory(pAce, ref tTempAce, Marshal.SizeOf(tTempAce));
RtlMoveMemory(pDt, lPointer, iSidLen);
return AddAce(lAclId, ACL_REVISION, MAXDWORD, pAce, iAceLen);
}
return false;
}
finally
{
if (pAce != IntPtr.Zero)
{
LocalFree(pAce);
}
}
}
private bool SidIsEqual(IntPtr pSid1, IntPtr pSid2)
{
return (EqualSid(pSid1, pSid2));
}
Yes.. long spaghetti code is the order of the day.. but that's just how it's done, no simplified .NET methods for this kind of access,
at least none that I am aware of.. With just a few changes, most NTFS objects can have their security descriptors modified, including files,
named pipes, etc. If you want a hint at how this can be done, it's all in a VB6 project I wrote some years back, called NTMasterClass.
System restore
Creating a restore point is probably a good idea for any application that makes serious modifications to the Registry, and included in the scan library
is a class that can do just that. It's also a good idea to launch this on a background worker thread, and provide a visual indicator for the user:
private void RestoreProgressStart()
{
_dTime = DateTime.Now;
_bRestoreComplete = false;
_aRestoreTimer.IsEnabled = true;
grdRestore.Visibility = Visibility.Visible;
_pnlScanResults.lstResults.IsEnabled = false;
UnLockControls(false);
_oProcessAsyncBackgroundWorker = new BackgroundWorker();
_oProcessAsyncBackgroundWorker.WorkerSupportsCancellation = true;
_oProcessAsyncBackgroundWorker.DoWork +=
new DoWorkEventHandler(_oProcessAsyncBackgroundWorker_DoWork);
_oProcessAsyncBackgroundWorker.RunWorkerCompleted +=
new RunWorkerCompletedEventHandler(_oProcessAsyncBackgroundWorker_RunWorkerCompleted);
_oProcessAsyncBackgroundWorker.RunWorkerAsync();
double safe = 0;
do
{
DoEvents();
_tTimeElapsed = DateTime.Now.Subtract(_dTime);
safe = _tTimeElapsed.TotalSeconds;
if (safe > 300)
{
break;
}
} while (_bRestoreComplete != true);
}
The DoEvents
method allows UI processing to continue while the system restore is in progress, the loop is a form of wait timer that exits when
the StartRestore
method returns.
private static void DoEvents()
{
DispatcherFrame frame = new DispatcherFrame(true);
Dispatcher.CurrentDispatcher.BeginInvoke(
DispatcherPriority.Background, (SendOrPostCallback)delegate(object arg)
{
var f = arg as DispatcherFrame;
f.Continue = false;
},
frame
);
Dispatcher.PushFrame(frame);
}
The restore class itself is completely portable, and can be dropped into other applications.
public class cRestore
{
#region Constants
private const int APPLICATION_INSTALL = 0;
private const int APPLICATION_UNINSTALL = 1;
private const int DEVICE_DRIVER_INSTALL = 10;
private const int MODIFY_SETTINGS = 12;
private const int CANCELLED_OPERATION = 13;
private const int FO_DELETE = 0x3;
private const int FOF_ALLOWUNDO = 0x40;
private const int FOF_NOCONFIRMATION = 0x10;
private const int BEGIN_SYSTEM_CHANGE = 100;
private const int END_SYSTEM_CHANGE = 101;
private const int BEGIN_NESTED_SYSTEM_CHANGE = 102;
private const int END_NESTED_SYSTEM_CHANGE = 103;
private const int DESKTOP_SETTING = 2;
private const int ACCESSIBILITY_SETTING = 3;
private const int OE_SETTING = 4;
private const int APPLICATION_RUN = 5;
private const int WINDOWS_SHUTDOWN = 8;
private const int WINDOWS_BOOT = 9;
private const int MAX_DESC = 64;
private const int MAX_DESC_W = 256;
private const string RESTORE_KEY =
@"Software\Microsoft\Windows NT\CurrentVersion\SystemRestore";
private const string RESTORE_VALUE =
@"SystemRestorePointCreationFrequency";
#endregion
#region Enum
private enum RESTORE_TYPE
{
APPLICATION_INSTALL = 0,
APPLICATION_UNINSTALL = 1,
MODIFY_SETTINGS = 12,
CANCELLED_OPERATION = 13,
RESTORE = 6,
CHECKPOINT = 7,
DEVICE_DRIVER_INSTALL = 10,
FIRSTRUN = 11,
BACKUP_RECOVERY = 14,
}
#endregion
#region Structs
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
internal struct RESTOREPTINFO
{
public int dwEventType;
public int dwRestorePtType;
public Int64 llSequenceNumber;
[MarshalAs(UnmanagedType.ByValTStr, SizeConst = MAX_DESC_W + 1)]
public string szDescription;
}
[StructLayout(LayoutKind.Sequential)]
internal struct SMGRSTATUS
{
public int nStatus;
public Int64 llSequenceNumber;
}
#endregion
#region API
[DllImport("srclient.dll")]
[return: MarshalAs(UnmanagedType.Bool)]
private static extern bool SRSetRestorePointW(ref RESTOREPTINFO pRestorePtSpec,
out SMGRSTATUS pSMgrStatus);
#endregion
#region Fields
private long _lSeqNum = 0;
private int _iRestInt = 0;
#endregion
#region Methods
public bool StartRestore(string Description)
{
int maj = Environment.OSVersion.Version.Major;
int min = Environment.OSVersion.Version.Minor;
RESTOREPTINFO tRPI = new RESTOREPTINFO();
SMGRSTATUS tStatus = new SMGRSTATUS();
if (!(maj == 4 && min == 90 || maj > 4))
{
return false;
}
tRPI.dwEventType = BEGIN_SYSTEM_CHANGE;
tRPI.dwRestorePtType = (int)RESTORE_TYPE.MODIFY_SETTINGS;
tRPI.llSequenceNumber = 0;
tRPI.szDescription = Description;
cLightning cl = new cLightning();
if (cl.ValueExists(cLightning.ROOT_KEY.HKEY_LOCAL_MACHINE,
RESTORE_KEY, RESTORE_VALUE))
{
_iRestInt = cl.ReadDword(cLightning.ROOT_KEY.HKEY_LOCAL_MACHINE,
RESTORE_KEY, RESTORE_VALUE);
}
cl.WriteDword(cLightning.ROOT_KEY.HKEY_LOCAL_MACHINE, RESTORE_KEY, RESTORE_VALUE, 2);
if (SRSetRestorePointW(ref tRPI, out tStatus))
{
_lSeqNum = tStatus.llSequenceNumber;
return true;
}
return false;
}
public bool EndRestore(bool Cancel)
{
RESTOREPTINFO tRPI = new RESTOREPTINFO();
SMGRSTATUS tStatus = new SMGRSTATUS();
bool success = false;
tRPI.dwEventType = END_SYSTEM_CHANGE;
tRPI.llSequenceNumber = _lSeqNum;
if (Cancel == true)
{
tRPI.dwRestorePtType = CANCELLED_OPERATION;
}
try
{
success = (SRSetRestorePointW(ref tRPI, out tStatus));
}
finally
{
cLightning cl = new cLightning();
cl.WriteDword(cLightning.ROOT_KEY.HKEY_LOCAL_MACHINE,
RESTORE_KEY, RESTORE_VALUE, _iRestInt);
}
return success;
}
#endregion
}
Visuals
The circular progress bar was adapted from a Silverlight example by Colin Eberhardt and made into a nifty little user control.
The progressbar in the list tems was fashioned by overlapping image brushes:
<ProgressBar Maximum="10" Minimum="1" Value="{Binding Scope}" Width="72" Height="14" Margin="2">
<ProgressBar.Template>
<ControlTemplate>
<Grid>
<Rectangle Name="PART_Track" HorizontalAlignment="Left"
VerticalAlignment="Top" Margin="1" Height="14" Width="66">
<Rectangle.Fill>
<ImageBrush ImageSource="..\Images\starsbg.png"
Stretch="None" AlignmentX="Left" AlignmentY="Top" />
</Rectangle.Fill>
</Rectangle>
<Rectangle Name="PART_Indicator" HorizontalAlignment="Left"
VerticalAlignment="Top" Margin="1" Height="14">
<Rectangle.Fill>
<ImageBrush ImageSource="..\Images\stars.png"
Stretch="None" AlignmentX="Left" AlignmentY="Top" />
</Rectangle.Fill>
</Rectangle>
</Grid>
</ControlTemplate>
</ProgressBar.Template>
</ProgressBar>
The rest is just style and brushes..
Final thoughts..
Though I have tested this on several different machines (Vista/W7) with no problems or surprises, remember, it is beta.. though I think even in a worst case scenario,
you might have to run system restore.. just don't let Billy play with your Regedit ;0)
Updates
- Dec 20, 2011 -Added a visual to system restore process, which is now launching as a background thread.
- Dec 31, 2011 -Added updated code and expanded article.
- Jan 1, 2012 - Did a heap of bug fixing, so it's pretty much done now (perhaps a couple of cosmetic todo's), If you find a bug, shout out (and if you're nice, I might even fix it.. ;o).
- Jan 4, 2012 - Tested on Vista64. Changes made to support 64 bit OS scan. Bug found in API declaration in
cSecurity
caused memory error in 64. Fixed parse error
in CircularProgressBar::GridUtils
. - Jan 29, 2011 - Some small bugs fixed, changed iconography slightly.