Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- chosen_formula = dword ptr -4
- .text:005D173F
- .text:005D173F push ebp
- .text:005D1740 mov ebp, esp
- .text:005D1742 sub esp, 0Ch
- .text:005D1745 mov eax, BattleContextPtr
- .text:005D174A mov ecx, [eax+0A0h]
- .text:005D1750 mov edx, dword_C069C0[ecx*4]
- .text:005D1757 mov [ebp+var_8], edx
- .text:005D175A mov eax, BattleContextPtr
- .text:005D175F mov ecx, [eax+0A4h]
- .text:005D1765 mov edx, FormulaPtrTable[ecx*4]
- .text:005D176C mov [ebp+chosen_formula], edx
- .text:005D176F
- .text:005D176F loc_5D176F: ; CODE XREF: ChooseDamageFormula+59↓j
- .text:005D176F mov eax, [ebp+var_8]
- .text:005D1772 xor ecx, ecx
- .text:005D1774 mov cl, ds:byte_7B7700[eax]
- .text:005D177A mov [ebp+var_C], ecx
- .text:005D177D mov edx, [ebp+var_C]
- .text:005D1780 mov eax, [ebp+var_8]
- .text:005D1783 add eax, 1
- .text:005D1786 mov [ebp+var_8], eax
- .text:005D1789 cmp edx, 8
- .text:005D178C jz short loc_5D179A
- .text:005D178E mov ecx, [ebp+var_C]
- .text:005D1791 call ds:off_7B77A8[ecx*4]
- .text:005D1798 jmp short loc_5D176F
- .text:005D179A ; ---------------------------------------------------------------------------
- .text:005D179A
- .text:005D179A loc_5D179A: ; CODE XREF: ChooseDamageFormula+4D↑j
- .text:005D179A mov edx, BattleContextPtr
- .text:005D17A0 cmp dword ptr [edx+48h], 0
- .text:005D17A4 jz short loc_5D17C3
- .text:005D17A6 cmp [ebp+chosen_formula], 0
- .text:005D17AA jz short loc_5D17C3
- .text:005D17AC push 0
- .text:005D17AE call BigBattleContextSetup?
- .text:005D17B3 add esp, 4
- .text:005D17B6 call [ebp+chosen_formula]
- .text:005D17B9 push 1
- .text:005D17BB call BigBattleContextSetup?
- .text:005D17C0 add esp, 4
- .text:005D17C3
- .text:005D17C3 loc_5D17C3: ; CODE XREF: ChooseDamageFormula+65↑j
- .text:005D17C3 ; ChooseDamageFormula+6B↑j
- .text:005D17C3 mov esp, ebp
- .text:005D17C5 pop ebp
- .text:005D17C6 retn
- .text:005D17C6 ChooseDamageFormula endp
Add Comment
Please, Sign In to add comment