| View previous topic :: View next topic |
| Author |
Message |
nick99nack Admin

Joined: 30 Aug 2023 Age: 30 Posts: 171 Location: NJ, USA
|
Posted: Sun Apr 07, 2024 9:01 pm Post subject: [Guide] Patching MSN Messenger 4.7.3001 for Escargot |
|
|
Quick guide for patching MSN Messenger 4.7.3001 for Escargot.
Open a hex editor (I recommend HxD), edit msnmsgr.exe, find and replace the following:
| Code: | "messenger.hotmail.com" with "msnmsgr.escargot.chat"
"PassportURLs" with "Passporturls"
"https://nexus.passport.com/rdr/pprdr.asp" with "https://msnmsgr.escargot.chat/nexus-mock" |
_________________ If you like browsing without an ad blocker, you might also like getting rid of your virus scanner, and running around with your pants down. --SomeGuy, 2016 |
|
| Back to top |
|
 |
HIDEN CrossTalk Staff

Joined: 09 Sep 2023 Posts: 15 Location: AR, USA
|
Posted: Fri Apr 19, 2024 12:36 am Post subject: |
|
|
Part of me wants to look into why Escargot Switcher doesn't work with this version... yet it works absolutely fine with Windows Messenger 5.0+ (which to my knowledge, is almost identical). _________________ Known to cause cancer in the state of California. |
|
| Back to top |
|
 |
nick99nack Admin

Joined: 30 Aug 2023 Age: 30 Posts: 171 Location: NJ, USA
|
Posted: Sun Aug 25, 2024 6:02 pm Post subject: |
|
|
To add to this, the minimum updates required to get XP SP3 to work with Escargot:
1. Apply the POSReady Registry patch:
| Code: | Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady]
"Installed"=dword:00000001
|
2. Download the TLS update from the Microsoft Update Catalog: KB4019276 update for POSReady 2009
3. Apply the TLS registry patch:
| Code: | Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client]
"DisabledByDefault"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server]
"DisabledByDefault"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
"DisabledByDefault"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server]
"DisabledByDefault"=dword:00000000
|
_________________ If you like browsing without an ad blocker, you might also like getting rid of your virus scanner, and running around with your pants down. --SomeGuy, 2016 |
|
| Back to top |
|
 |
|