Samozrejme
Je to Memory Dump s WoW.exe. Podla toho Reverse Engineery hladaju Opcody, Structury a vsetko okolo toho.
Na prehliadanie tohoto dumpu je potreba IDA 6.1 + HEXRAYS.
Paar 4.2.0a opcodov.
NAME HEX DEC
CMSG_CANCEL_GROWTH_AURA = 0x3E7E | 15998
CMSG_DUEL_ACCEPTED = 0xF63B | 32767
CMSG_DUEL_CANCELLED = 0x362E | 13870
CMSG_GET_MIRRORIMAGE_DATA = 0xEEEA | 32767
CMSG_GMTICKET_CREATE = 0x2223 | 8739
CMSG_GMTICKET_DELETETICKET = 0xFE22 | 32767
CMSG_GMTICKET_GETTICKET = 0x32A2 | 12962
CMSG_GMTICKET_UPDATETEXT = 0x6A2B | 27179
CMSG_ITEM_REFUND_INFO = 0xE276 | 32767
CMSG_PETITION_BUY = 0x2A26 | 10790
CMSG_PUSHQUESTTOPARTY = 0x22B2 | 8882
CMSG_QUESTGIVER_ACCEPT_QUEST = 0xF2AB | 32767
CMSG_QUESTGIVER_CHOOSE_REWARD = 0x3EAB | 16043
CMSG_QUESTGIVER_COMPLETE_QUEST = 0x72E3 | 29411
CMSG_QUESTGIVER_QUERY_QUEST = 0xBEEB | 32767
CMSG_QUESTGIVER_REQUEST_REWARD = 0xE27F | 32767
CMSG_QUESTGIVER_STATUS_QUERY = 0x7223 | 29219
CMSG_QUESTLOG_REMOVE_QUEST = 0x3A3F | 14911
CMSG_TAXINODE_STATUS_QUERY = 0x6622 | 26146
SMSG_READ_ITEM_OK = 0xB6E7 | 32767
More Opcodes
NAME HEX DEC
CMSG_REQUEST_PET_INFO = 0xA6A2 | 42658
CMSG_QUERY_TIME = 0x3226 | 12838
CMSG_MEETINGSTONE_INFO = 0x7622 | 30242
CMSG_GMTICKET_UPDATETEXT = 0x6A2B | 27179
CMSG_GMTICKET_GETTICKET = 0x32A2 | 12962
CMSG_GMTICKET_DELETETICKET = 0xFE22 | 65058
CMSG_GMRESPONSE_RESOLVE = 0x363E | 13886
CMSG_GMSURVEY_SUBMIT = 0xBEBB | 48827
CMSG_GM_REPORT_LAG = 0xE2A6 | 58022
Opcodes 15.08.2011
NAME HEX DEC
CMSG_MINIGAME_MOVE = 0xBABB | 47803
SMSG_QUESTLOG_FULL = 0x726F | 29295
CMSG_TEXT_EMOTE = 0x7EB6 | 32438
CMSG_LOGOUT_CANCEL = 0xF2BF | 62143
CMSG_CHAR_CREATE = 0x2A22 | 10786
CMSG_CHAR_DELETE = 0x6E32 | 28210
CMSG_GOSSIP_HELLO = 0xEE7B | 61051
CMSG_QUESTGIVER_HELLO = 0xB22A | 45610
CMSG_PETITION_SHOWLIST = 0x2E2F | 11823
CMSG_QUESTGIVER_STATUS_MULTIPLE_QUERY = 0xA2FA | 41722