@@ -252,12 +252,15 @@ PSTR VirusTotalSendHttpRequest(
252
252
HINTERNET connectHandle = NULL ;
253
253
HINTERNET requestHandle = NULL ;
254
254
PSTR subRequestBuffer = NULL ;
255
+ PPH_STRING tokenVersion = NULL ;
255
256
PPH_STRING phVersion = NULL ;
256
257
PPH_STRING userAgent = NULL ;
257
258
WINHTTP_CURRENT_USER_IE_PROXY_CONFIG proxyConfig = { 0 };
258
259
259
260
phVersion = PhGetPhVersion ();
260
261
userAgent = PhConcatStrings2 (L"ProcessHacker_" , phVersion -> Buffer );
262
+ tokenVersion = PhConcatStrings2 (VIRUSTOTAL_URLPATH , VIRUSTOTAL_APIKEY );
263
+
261
264
WinHttpGetIEProxyConfigForCurrentUser (& proxyConfig );
262
265
263
266
if (!(httpSessionHandle = WinHttpOpen (
@@ -293,7 +296,7 @@ PSTR VirusTotalSendHttpRequest(
293
296
if (!(requestHandle = WinHttpOpenRequest (
294
297
connectHandle ,
295
298
L"POST" ,
296
- VIRUSTOTAL_URLPATH VIRUSTOTAL_APIKEY ,
299
+ tokenVersion -> Buffer ,
297
300
NULL ,
298
301
WINHTTP_NO_REFERER ,
299
302
WINHTTP_DEFAULT_ACCEPT_TYPES ,
@@ -376,6 +379,9 @@ PSTR VirusTotalSendHttpRequest(
376
379
if (httpSessionHandle )
377
380
WinHttpCloseHandle (httpSessionHandle );
378
381
382
+ if (tokenVersion )
383
+ PhDereferenceObject (tokenVersion );
384
+
379
385
return subRequestBuffer ;
380
386
}
381
387
@@ -402,7 +408,7 @@ NTSTATUS NTAPI VirusTotalProcessApiThread(
402
408
PSTR jsonArrayToSendString ;
403
409
PSTR jsonApiResult = NULL ;
404
410
PVOID jsonArray ;
405
- PVOID rootJsonObject ;
411
+ PVOID rootJsonObject = NULL ;
406
412
PVOID dataJsonObject ;
407
413
PPH_LIST resultTempList = NULL ;
408
414
PPH_LIST virusTotalResults = NULL ;
@@ -504,6 +510,11 @@ NTSTATUS NTAPI VirusTotalProcessApiThread(
504
510
PhDereferenceObject (virusTotalResults );
505
511
}
506
512
513
+ if (rootJsonObject )
514
+ {
515
+ CleanupJsonParser (rootJsonObject );
516
+ }
517
+
507
518
if (jsonArray )
508
519
{
509
520
CleanupJsonParser (jsonArray );
0 commit comments