- Apr 30, 2015
- 933
- 1,014
- 217
Ok...
Today I was checking a process using ProcMon and I thought about using it to see what teamspeak was accessing.
Interesting stuff I found
-Derp
Today I was checking a process using ProcMon and I thought about using it to see what teamspeak was accessing.
Interesting stuff I found

ts3client_win32.exe 2868 QueryOpen C:\jenkins\workspace\Dependencies-Qt-Windows\5.4.1-32\qtbase\plugins PATH NOT FOUND
ts3client_win32.exe 3748 RegOpenKey HKLM\Software\Microsoft\Cryptography\DESHashSessionKeyBackward NAME NOT FOUND Desired Access: Read
ts3client_win32.exe 3748 RegOpenKey HKLM\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Microsoft Base Cryptographic Provider v1.0 SUCCESS
ts3client_win32.exe 3748 RegOpenKey HKLM\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Microsoft Base Cryptographic Provider v1.0 SUCCESS
-Derp