This has nothing to do with assembly.
To parse this action, you need to split it by 0x0 character 3 times, to read the 3 first strings, then depending the value of these strings, you have to interpretate them correctly.
After you'll need to read a dword.
Just to skip the action properly you'll need something like that:
Code: $n++; // skip the action byte
while ($actionblock{$n} != "\x00") {
$n++;
}
$n++;
while ($actionblock{$n} != "\x00") {
$n++;
}
$n++;
while ($actionblock{$n} != "\x00") {
$n++;
}
$n++;
$n+=4; // skip the dword
You might also want to fix action 0x60 by the following code if it is not fixed.
Code: // Map trigger chat command (?)
case 0x60:
$n++; // skip the action byte
$n+=8; // skip two dwords
while ($actionblock{$n} != "\x00") {
$n++;
}
$n++;
break;
esby