WowClassic 1.15.7.60249 Offsets menu

User Tag List

Results 1 to 13 of 13
  1. #1
    dreadcraft's Avatar Member
    Reputation
    12
    Join Date
    Jun 2018
    Posts
    33
    Thanks G/R
    30/11
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    WowClassic 1.15.7.60249 Offsets

    Code:
    # pointers
    object_manager = 0x376D0F8
    player_guid = 0x3782C10
    mouseover_guid = 0x389CA48
    zone_text = 0x389BCA8
    subzone_text = zone_text + 0x8
    minimap_zone_text = subzone_text + 0x8
    player_target_guid = 0x35651B8
    last_target_guid = player_target_guid + 0x10
    camera_manager = 0x377AF50
    
    # offsets updated
    camera = 0x478 # 1.15.6 was 0x3A58 
    player_field_inventory = 0x15F98 # 1.15.6 was 0x138F0
    unit_field_channel_spell = 0x790
    unit_field_channel_start = 0x798
    unit_field_channel_end = unit_field_channel_start + 0x4
    # im guessing unit_field_cast_spell and relevant timestamps changed also but i'm not using them right now
    looks like fortunately nothing big changed with object manager/entity builder but not sure since i have only minimally tested these.

    something important though. I tried to reach out to @namreeb via DM but vbulletin would not allow it. not sure why since i've had plenty of DMs on this account.

    anyways. dumpwow seems to be working fine in Windows 10 still, but running it in Windows 11 results in:
    Wow base address: 0x7ff748bf0000
    TLS callback directory: 0x7ff74b7a1518
    First TLS callback: 0x7ff748bf4d70
    Wow exited with code: 0xc0000005
    Failed to read [...]log.txt
    Tried running elevated command prompt and that didn't fix the issue. Not sure what's going on here but in the event that it's relevant to Blizzard making Windows 11-only changes to their anti-debugging measures I figured it was worth sharing here. I don't know my github login and don't have time to mess with it or WoW really right now.

    Thanks to everyone who contributes here, esp. namreeb.

    WowClassic 1.15.7.60249 Offsets
  2. #2
    scizzydo's Avatar Established Member
    Reputation
    193
    Join Date
    Oct 2019
    Posts
    129
    Thanks G/R
    5/86
    Trade Feedback
    0 (0%)
    Mentioned
    4 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by dreadcraft View Post
    Code:
    # pointers
    object_manager = 0x376D0F8
    player_guid = 0x3782C10
    mouseover_guid = 0x389CA48
    zone_text = 0x389BCA8
    subzone_text = zone_text + 0x8
    minimap_zone_text = subzone_text + 0x8
    player_target_guid = 0x35651B8
    last_target_guid = player_target_guid + 0x10
    camera_manager = 0x377AF50
    
    # offsets updated
    camera = 0x478 # 1.15.6 was 0x3A58 
    player_field_inventory = 0x15F98 # 1.15.6 was 0x138F0
    unit_field_channel_spell = 0x790
    unit_field_channel_start = 0x798
    unit_field_channel_end = unit_field_channel_start + 0x4
    # im guessing unit_field_cast_spell and relevant timestamps changed also but i'm not using them right now
    looks like fortunately nothing big changed with object manager/entity builder but not sure since i have only minimally tested these.

    something important though. I tried to reach out to @namreeb via DM but vbulletin would not allow it. not sure why since i've had plenty of DMs on this account.

    anyways. dumpwow seems to be working fine in Windows 10 still, but running it in Windows 11 results in:


    Tried running elevated command prompt and that didn't fix the issue. Not sure what's going on here but in the event that it's relevant to Blizzard making Windows 11-only changes to their anti-debugging measures I figured it was worth sharing here. I don't know my github login and don't have time to mess with it or WoW really right now.

    Thanks to everyone who contributes here, esp. namreeb.
    I haven't seen dumping issues with mine: GitHub - scizzydo/memdump: Windows x64 PE process memory dumper to disk

  3. Thanks dreadcraft, namreeb, Makkah (3 members gave Thanks to scizzydo for this useful post)
  4. #3
    namreeb's Avatar Legendary

    Reputation
    668
    Join Date
    Sep 2008
    Posts
    1,029
    Thanks G/R
    8/222
    Trade Feedback
    0 (0%)
    Mentioned
    9 Post(s)
    Tagged
    0 Thread(s)
    I'm not sure why you couldn't DM me. In the case of dumpwow, the commits I made recently should fix that. The issue was with hadesmem relying on TLS which was not available at the time a function hook was being called. But that function hook was not critical to the export, so I've disabled it.

    The import obfuscation has been updated and I haven't looked at that yet, so I wouldn't expect that to work.

  5. Thanks aeo, dreadcraft (2 members gave Thanks to namreeb for this useful post)
  6. #4
    ring3's Avatar Member
    Reputation
    2
    Join Date
    Nov 2014
    Posts
    14
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Someone has found UnitExists and so on with classic build? I was searching for it but it seems like its strong obfuscated

  7. #5
    Makkah's Avatar Active Member Authenticator enabled
    Reputation
    45
    Join Date
    Jun 2024
    Posts
    67
    Thanks G/R
    10/29
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    UnitExists:
    [
    Code:
    v2 = lua_tolstring(a1, 1i64, 0i64);
      sub_142231120(&v29, v2, 0i64);
      v3 = sub_1402D4280();
      v4 = sub_1416D8760(
             &v29,
             (unsigned int)v3,
             "D:\\BuildServer\\A\\work-git\\wow\\Classic\\Source\\UIUtil\\ScriptEvents.cpp",
             218i64);
      v5 = sub_141E40B90();
      v7 = 0;
      if ( v29 || v30 )
      {
        if ( (v6 = (_QWORD *)sub_141BE3CE0(), *v6 == v29) && v6[1] == v30
          || v4 && (*(unsigned int (__fastcall **)(_QWORD))(**(_QWORD **)(v4 + 48) + 80i64))(*(_QWORD *)(v4 + 48))
          || v5 && (sub_141E40890(v5, &v29, 0i64) || (unsigned __int8)sub_141E416C0(v5, &v29)) )
        {
          v7 = 1;
        }
      }
      lua_pushboolean(a1, v7);

  8. #6
    namreeb's Avatar Legendary

    Reputation
    668
    Join Date
    Sep 2008
    Posts
    1,029
    Thanks G/R
    8/222
    Trade Feedback
    0 (0%)
    Mentioned
    9 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by namreeb View Post
    I'm not sure why you couldn't DM me. In the case of dumpwow, the commits I made recently should fix that. The issue was with hadesmem relying on TLS which was not available at the time a function hook was being called. But that function hook was not critical to the export, so I've disabled it.

    The import obfuscation has been updated and I haven't looked at that yet, so I wouldn't expect that to work.
    Just posted version 0.4 which fixes a lot of the import reconstruction and TLS callback issues: Release 0.4 . namreeb/dumpwow . GitHub

  9. Thanks dreadcraft (1 members gave Thanks to namreeb for this useful post)
  10. #7
    dreadcraft's Avatar Member
    Reputation
    12
    Join Date
    Jun 2018
    Posts
    33
    Thanks G/R
    30/11
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by namreeb View Post
    Just posted version 0.4 which fixes a lot of the import reconstruction and TLS callback issues: Release 0.4 . namreeb/dumpwow . GitHub
    Wow, you rule man! I'm excited to take a look at this when I get home. Thank you again.

  11. #8
    dreadcraft's Avatar Member
    Reputation
    12
    Join Date
    Jun 2018
    Posts
    33
    Thanks G/R
    30/11
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Someone asked if I had a copy of 60249 so I uploaded it to mega.nz:
    https://mega.nz/file/8NtgUTha#igEGG0...oQgtBuc-U-2qas
    @scimmy

  12. Thanks scimmy (1 members gave Thanks to dreadcraft for this useful post)
  13. #9
    Makkah's Avatar Active Member Authenticator enabled
    Reputation
    45
    Join Date
    Jun 2024
    Posts
    67
    Thanks G/R
    10/29
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Screenshot-2025-05-05-213824.png

    your dump didnt handle the TLS, i highly recommend using @scizzydo PE dumper, its as easy as drag and drop your wow.exe into memdump.exe.
    Last edited by Makkah; 05-05-2025 at 11:48 PM.

  14. #10
    scimmy's Avatar Active Member
    Reputation
    70
    Join Date
    Jul 2020
    Posts
    57
    Thanks G/R
    2/36
    Trade Feedback
    0 (0%)
    Mentioned
    7 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Makkah View Post
    Screenshot-2025-05-05-213824.png

    your dump didnt handle the TLS, i highly recommend using @scizzydo PE dumper, its as easy as drag and drop your wow.exe into memdump.exe.
    I think namreeb's dumper should handle all this too?

  15. #11
    Makkah's Avatar Active Member Authenticator enabled
    Reputation
    45
    Join Date
    Jun 2024
    Posts
    67
    Thanks G/R
    10/29
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    i believe it does, but i have not tried it. ill post my ida db file for 1.15.7.60277 once i finish clean it up. currently writing a python script to fix the args in function automaticly.

  16. Thanks Taitasheri (1 members gave Thanks to Makkah for this useful post)
  17. #12
    aeo's Avatar Contributor
    Reputation
    135
    Join Date
    Apr 2007
    Posts
    286
    Thanks G/R
    97/68
    Trade Feedback
    7 (100%)
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Makkah View Post
    i believe it does, but i have not tried it. ill post my ida db file for 1.15.7.60277 once i finish clean it up. currently writing a python script to fix the args in function automaticly.
    Looking forward to this, you seem to have put a lot of time and effort in to the work.

  18. #13
    dreadcraft's Avatar Member
    Reputation
    12
    Join Date
    Jun 2018
    Posts
    33
    Thanks G/R
    30/11
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hey all, sorry, regarding the TLS being bad I don't have the original packed executable anymore. So if you're not able to fix it, I'm certainly not able to.

    Makkah, your python script to fix function args sounds really exciting. Would love to hear more.

Similar Threads

  1. WowClassic 1.15.6.59415 Offsets
    By mazer in forum WoW Memory Editing
    Replies: 2
    Last Post: 03-01-2025, 07:24 AM
  2. WowClassic 1.15.6.58912 Offsets
    By mazer in forum WoW Memory Editing
    Replies: 2
    Last Post: 02-26-2025, 11:58 AM
  3. WowClassic 1.15.6.58797 Offsets
    By pickleback in forum WoW Memory Editing
    Replies: 15
    Last Post: 01-29-2025, 07:29 AM
  4. WowClassic 1.15.5.58555 Offsets
    By mazer in forum WoW Memory Editing
    Replies: 2
    Last Post: 01-20-2025, 08:00 AM
  5. WowClassic 1.15.5.57979 Offsets
    By dreadcraft in forum WoW Memory Editing
    Replies: 1
    Last Post: 01-06-2025, 03:27 PM
All times are GMT -5. The time now is 12:30 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search