Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- HandleSMSG_ATTACKERSTATEUPDATE_inner proc near
- .text:00600A20 ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE+B6p
- .text:00600A20
- .text:00600A20 var_8 = dword ptr -8
- .text:00600A20 var_2 = byte ptr -2
- .text:00600A20 var_1 = byte ptr -1
- .text:00600A20 arg_0 = dword ptr 8
- .text:00600A20
- .text:00600A20 push ebp
- .text:00600A21 mov ebp, esp
- .text:00600A23 sub esp, 8
- .text:00600A26 push ebx
- .text:00600A27 push esi
- .text:00600A28 mov esi, [ebp+arg_0]
- .text:00600A2B push edi
- .text:00600A2C mov edi, ecx
- .text:00600A2E lea eax, [edi+10h]
- .text:00600A31 push eax
- .text:00600A32 mov ecx, esi
- .text:00600A34 call ReadInt32
- .text:00600A39 push edi
- .text:00600A3A push esi
- .text:00600A3B call ReadPackGUID
- .text:00600A40 lea eax, [edi+8]
- .text:00600A43 push eax
- .text:00600A44 push esi
- .text:00600A45 call ReadPackGUID
- .text:00600A4A add esp, 10h
- .text:00600A4D lea eax, [edi+14h]
- .text:00600A50 push eax
- .text:00600A51 mov ecx, esi
- .text:00600A53 call ReadInt32
- .text:00600A58 lea eax, [edi+18h]
- .text:00600A5B push eax
- .text:00600A5C mov ecx, esi
- .text:00600A5E call ReadInt32
- .text:00600A63 lea ecx, [ebp+arg_0+3]
- .text:00600A66 push ecx
- .text:00600A67 mov ecx, esi
- .text:00600A69 call ReadInt8
- .text:00600A6E mov al, byte ptr [ebp+arg_0+3]
- .text:00600A71 test al, al
- .text:00600A73 mov [ebp+var_1], 0
- .text:00600A77 jbe short loc_600AB8
- .text:00600A79 lea esp, [esp+0]
- .text:00600A80
- .text:00600A80 loc_600A80: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+96j
- .text:00600A80 movzx ebx, [ebp+var_1]
- .text:00600A84 lea edx, [edi+ebx*4+1Ch]
- .text:00600A88 push edx
- .text:00600A89 mov ecx, esi
- .text:00600A8B call ReadInt32
- .text:00600A90 lea eax, [edi+ebx*4+34h]
- .text:00600A94 push eax
- .text:00600A95 mov ecx, esi
- .text:00600A97 call ReadFloat
- .text:00600A9C lea ecx, [edi+ebx*4+3Ch]
- .text:00600AA0 push ecx
- .text:00600AA1 mov ecx, esi
- .text:00600AA3 call ReadInt32
- .text:00600AA8 mov cl, [ebp+var_1]
- .text:00600AAB mov al, byte ptr [ebp+arg_0+3]
- .text:00600AAE add cl, 1
- .text:00600AB1 cmp cl, al
- .text:00600AB3 mov [ebp+var_1], cl
- .text:00600AB6 jb short loc_600A80
- .text:00600AB8
- .text:00600AB8 loc_600AB8: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+57j
- .text:00600AB8 test byte ptr [edi+10h], 60h
- .text:00600ABC jz short loc_600ADD
- .text:00600ABE xor bl, bl
- .text:00600AC0 test al, al
- .text:00600AC2 jbe short loc_600ADD
- .text:00600AC4
- .text:00600AC4 loc_600AC4: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+BBj
- .text:00600AC4 movzx edx, bl
- .text:00600AC7 lea eax, [edi+edx*4+44h]
- .text:00600ACB push eax
- .text:00600ACC mov ecx, esi
- .text:00600ACE call ReadInt32
- .text:00600AD3 mov al, byte ptr [ebp+arg_0+3]
- .text:00600AD6 add bl, 1
- .text:00600AD9 cmp bl, al
- .text:00600ADB jb short loc_600AC4
- .text:00600ADD
- .text:00600ADD loc_600ADD: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+9Cj
- .text:00600ADD ; HandleSMSG_ATTACKERSTATEUPDATE_inner+A2j
- .text:00600ADD test dword ptr [edi+10h], 180h
- .text:00600AE4 jz short loc_600B07
- .text:00600AE6 xor bl, bl
- .text:00600AE8 test al, al
- .text:00600AEA jbe short loc_600B07
- .text:00600AEC lea esp, [esp+0]
- .text:00600AF0
- .text:00600AF0 loc_600AF0: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+E5j
- .text:00600AF0 movzx ecx, bl
- .text:00600AF3 lea edx, [edi+ecx*4+4Ch]
- .text:00600AF7 push edx
- .text:00600AF8 mov ecx, esi
- .text:00600AFA call ReadInt32
- .text:00600AFF add bl, 1
- .text:00600B02 cmp bl, byte ptr [ebp+arg_0+3]
- .text:00600B05 jb short loc_600AF0
- .text:00600B07
- .text:00600B07 loc_600B07: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+C4j
- .text:00600B07 ; HandleSMSG_ATTACKERSTATEUPDATE_inner+CAj
- .text:00600B07 lea eax, [ebp+var_2]
- .text:00600B0A push eax
- .text:00600B0B mov ecx, esi
- .text:00600B0D call ReadInt8
- .text:00600B12 movzx ecx, [ebp+var_2]
- .text:00600B16 lea edx, [edi+58h]
- .text:00600B19 mov [edi+54h], ecx
- .text:00600B1C push edx
- .text:00600B1D mov ecx, esi
- .text:00600B1F call ReadInt32
- .text:00600B24 lea eax, [edi+5Ch]
- .text:00600B27 push eax
- .text:00600B28 mov ecx, esi
- .text:00600B2A call ReadInt32
- .text:00600B2F test dword ptr [edi+10h], 2000h
- .text:00600B36 jz short loc_600B43
- .text:00600B38 lea ecx, [edi+60h]
- .text:00600B3B push ecx
- .text:00600B3C mov ecx, esi
- .text:00600B3E call ReadInt32
- .text:00600B43
- .text:00600B43 loc_600B43: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+116j
- .text:00600B43 test dword ptr [edi+10h], (offset loc_7FFFFE+2)
- .text:00600B4A jz short loc_600B57
- .text:00600B4C lea edx, [edi+64h]
- .text:00600B4F push edx
- .text:00600B50 mov ecx, esi
- .text:00600B52 call ReadInt32
- .text:00600B57
- .text:00600B57 loc_600B57: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+12Aj
- .text:00600B57 test byte ptr [edi+10h], 1
- .text:00600B5B jz loc_600C01
- .text:00600B61 lea eax, [edi+68h]
- .text:00600B64 push eax
- .text:00600B65 mov ecx, esi
- .text:00600B67 call ReadInt32
- .text:00600B6C lea ecx, [edi+6Ch]
- .text:00600B6F push ecx
- .text:00600B70 mov ecx, esi
- .text:00600B72 call ReadFloat
- .text:00600B77 lea edx, [edi+70h]
- .text:00600B7A push edx
- .text:00600B7B mov ecx, esi
- .text:00600B7D call ReadFloat
- .text:00600B82 lea eax, [edi+74h]
- .text:00600B85 push eax
- .text:00600B86 mov ecx, esi
- .text:00600B88 call ReadFloat
- .text:00600B8D lea ecx, [edi+78h]
- .text:00600B90 push ecx
- .text:00600B91 mov ecx, esi
- .text:00600B93 call ReadFloat
- .text:00600B98 lea edx, [edi+7Ch]
- .text:00600B9B push edx
- .text:00600B9C mov ecx, esi
- .text:00600B9E call ReadFloat
- .text:00600BA3 lea eax, [edi+80h]
- .text:00600BA9 push eax
- .text:00600BAA mov ecx, esi
- .text:00600BAC call ReadFloat
- .text:00600BB1 lea ecx, [edi+84h]
- .text:00600BB7 push ecx
- .text:00600BB8 mov ecx, esi
- .text:00600BBA call ReadFloat
- .text:00600BBF lea edx, [edi+88h]
- .text:00600BC5 push edx
- .text:00600BC6 mov ecx, esi
- .text:00600BC8 call ReadFloat
- .text:00600BCD lea ebx, [edi+2Ch]
- .text:00600BD0 mov [ebp+var_8], 2
- .text:00600BD7
- .text:00600BD7 loc_600BD7: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+1D1j
- .text:00600BD7 lea eax, [ebx-8]
- .text:00600BDA push eax
- .text:00600BDB mov ecx, esi
- .text:00600BDD call ReadFloat
- .text:00600BE2 push ebx
- .text:00600BE3 mov ecx, esi
- .text:00600BE5 call ReadFloat
- .text:00600BEA add ebx, 4
- .text:00600BED sub [ebp+var_8], 1
- .text:00600BF1 jnz short loc_600BD7
- .text:00600BF3 lea ecx, [edi+8Ch]
- .text:00600BF9 push ecx
- .text:00600BFA mov ecx, esi
- .text:00600BFC call ReadInt32
- .text:00600C01
- .text:00600C01 loc_600C01: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+13Bj
- .text:00600C01 mov ecx, [edi+0Ch]
- .text:00600C04 mov eax, [edi+8]
- .text:00600C07 push 3DDh
- .text:00600C0C push offset a_Unitcombat_c_ ; ".\\UnitCombat_C.cpp"
- .text:00600C11 push 8
- .text:00600C13 push ecx
- .text:00600C14 push eax
- .text:00600C15 call sub_80E690
- .text:00600C1A add esp, 14h
- .text:00600C1D test eax, eax
- .text:00600C1F jz short loc_600C34
- .text:00600C21 cmp dword ptr [edi+14h], 0
- .text:00600C25 jnz short loc_600C34
- .text:00600C27 cmp dword ptr [edi+60h], 0
- .text:00600C2B jz short loc_600C34
- .text:00600C2D mov dword ptr [edi+54h], 5
- .text:00600C34
- .text:00600C34 loc_600C34: ; CODE XREF: HandleSMSG_ATTACKERSTATEUPDATE_inner+1FFj
- .text:00600C34 ; HandleSMSG_ATTACKERSTATEUPDATE_inner+205j ...
- .text:00600C34 pop edi
- .text:00600C35 pop esi
- .text:00600C36 pop ebx
- .text:00600C37 mov esp, ebp
- .text:00600C39 pop ebp
- .text:00600C3A retn 4
- .text:00600C3A HandleSMSG_ATTACKERSTATEUPDATE_inner endp
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement