Here’s a list based on a script I found at: http://geekswithblogs.net/mnf/archive/2006/04/20/75646.aspx
(Of course, bloggingaccident.com is not a SharePoint site and certainly doesn’t have AD, but I changed the domain to it to protect my innocent VM.)
objectClass=top;person;organizationalPerson;user
cn=teststudent2
sn=Student2
givenName=Test
distinguishedName=CN=teststudent2,CN=Users,DC=bloggingaccident,DC=com
instanceType=4
whenCreated=7/23/2008 2:59:23 PM
whenChanged=7/24/2008 8:12:12 PM
displayName=teststudent2
uSNCreated=System.__ComObject
memberOf=CN=Group Name,CN=Users,DC=bloggingaccident,DC=com
uSNChanged=System.__ComObject
name=teststudent2
objectGUID=System.Byte[]
userAccountControl=66048
badPwdCount=0
codePage=0
countryCode=0
employeeID=927654321
badPasswordTime=System.__ComObject
lastLogoff=System.__ComObject
lastLogon=System.__ComObject
pwdLastSet=System.__ComObject
primaryGroupID=513
objectSid=System.Byte[]
accountExpires=System.__ComObject
logonCount=39
sAMAccountName=teststudent2
sAMAccountType=805306368
userPrincipalName=teststudent2@bloggingaccident.com
objectCategory=CN=Person,CN=Schema,CN=Configuration,DC=bloggingaccident,DC=com
mail=teststudent2@bloggingaccident.com
nTSecurityDescriptor=System.__ComObject