[22:42:37] Syringe 0.7.2.0 (modified) [22:42:37] CnCNet Branch [22:42:37] =============== [22:42:37] WinMain: arguments = "-SPAWN -i=Ares.dll -i=CnCNet-Spawner.dll -i=Phobos.dll "gamemd-spawn.exe" -SPAWN -LOG -CD -Include -Inheritance -RA2ModeSaveID=0x8d113b94" [22:42:37] WinMain: Trying to load executable file "gamemd-spawn.exe"... [22:42:37] SyringeDebugger::SyringeDebugger: Unknown flag "-SPAWN", skipping. [22:42:37] SyringeDebugger::RetrieveInfo: Retrieving info from the executable file... [22:42:37] SyringeDebugger::RetrieveInfo: Executable information successfully retrieved. [22:42:37] exe = gamemd-spawn.exe [22:42:37] pImLoadLibrary = 0x007E1220 [22:42:37] pImGetProcAddress = 0x007E1250 [22:42:37] pcEntryPoint = 0x007CD80F [22:42:37] dwExeSize = 0x00497110 [22:42:37] dwExeCRC = 0x098465B3 [22:42:37] dwTimestamp = 0x3BDF544E [22:42:37] SyringeDebugger::RetrieveInfo: Opening gamemd-spawn.exe to determine imports. [22:42:37] WinMain: SyringeDebugger::FindDLLs(); [22:42:37] SyringeDebugger::FindDLLs: Searching for DLLs matching "Ares.dll"... [22:42:37] SyringeDebugger::FindDLLs: Recognized DLL: "Ares.dll" [22:42:38] SyringeDebugger::Handshake: Calling "Ares.dll" ... [22:42:38] SyringeDebugger::Handshake: Answers "Found Yuri's Revenge 1.001 (CD). Applying Ares 3.0p1." (0) [22:42:38] SyringeDebugger::FindDLLs: Searching for DLLs matching "CnCNet-Spawner.dll"... [22:42:38] SyringeDebugger::FindDLLs: Recognized DLL: "CnCNet-Spawner.dll" [22:42:38] SyringeDebugger::FindDLLs: Searching for DLLs matching "Phobos.dll"... [22:42:38] SyringeDebugger::FindDLLs: Recognized DLL: "Phobos.dll" [22:42:38] SyringeDebugger::FindDLLs: Done (2709 hooks added). [22:42:38] WinMain: SyringeDebugger::Run("-SPAWN -LOG -CD -Include -Inheritance -RA2ModeSaveID=0x8d113b94"); [22:42:38] SyringeDebugger::Run: Running process to debug. cmd = "gamemd-spawn.exe -SPAWN -LOG -CD -Include -Inheritance -RA2ModeSaveID=0x8d113b94" [22:42:38] SyringeDebugger::Run: Allocating 0x580 bytes... [22:42:38] SyringeDebugger::Run: pAlloc = 0x001E0000 [22:42:38] SyringeDebugger::Run: Writing DLL loader & caller code... [22:42:38] SyringeDebugger::Run: pcLoadLibrary = 0x001E0000 [22:42:38] SyringeDebugger::Run: Entering debug loop... [22:42:45] SyringeDebugger::HandleException: Finished retrieving proc addresses. [22:42:45] SyringeDebugger::HandleException: Creating code hooks. [23:03:40] SyringeDebugger::Run: Done with exit code 0 (0). [23:03:40] WinMain: SyringeDebugger::Run finished. [23:03:40] WinMain: Exiting on success.