Category : Unprotects for Games and Such
Archive   : SRGN4_FX.ZIP
Filename : SARGON4.TXT

 
Output of file : SARGON4.TXT contained in archive : SRGN4_FX.ZIP
Unprotect for Sargon IV


BE SURE TO BACKUP YOUR THE PROGRAM DISK BEFORE STARTING AND USE THE
BACK UP FOR THE UNPROTECT.
Modify only the backup copy!!!

First you should rename the file or files
SARGON.EXE TO SARGON


Ex. C>rename sargon.exe sargon

Next Load program into debug...

Ex. C>debug sargon

Then Follow the sample debug session:

-r : Get the value of the CS register

AX=???? BX=???? CX=???? DX=???? SP=???? BP=???? SI=???? DI=????
DS=???? ES=???? SS=???? CS=WWWW IP=???? ?? ?? ?? ?? ?? ?? ?? ??
WWWW:???? ?? ??? ??

XXXX=WWWW+2000 : Add 2000 hex to value
(These numbers are in hex. If you are
unfamiliar with the adding of hex
numbers don't attempt this patch)

-s XXXX:0000 ffff 26 8b 07 89 46 fa
: Search of protection pattern

XXXX:YYYY : The search will return one address.
If more than one is returned
this unprotect may not work.

-e XXXX:YYYY b8 00 10 : Edit the contents of the
returned address

Now write the new sargon game back to the disk:

-w

Writing XXXX bytes

Then Quit Debug:

-q

Now it is time to rename sargon back to sargon.exe

C>ren sargon sargon.exe

Now try to run the new (Hopefully) unprotected version of Sargon IV.
When the question comes up answer '1924'

C>sargon

--------------------------------------------------------------------------

Unprotect Brought to you courtesy of Super Dave

Super Dave can be reached at:

Hackers Paradise BBS
(803) 269-7899
Greenville, SC


  3 Responses to “Category : Unprotects for Games and Such
Archive   : SRGN4_FX.ZIP
Filename : SARGON4.TXT

  1. Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!

  2. This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.

  3. But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: http://www.os2museum.com/wp/mtswslnk/