006B0E08 FFD0 call eax
006B0E0A 85C0 test eax,eax
006B0E0C 74 12 je short asktao.006B0E20
006B0E0E 8038 00 cmp byte ptr ds:[eax],0x0
006B0E11 74 0D je short asktao.006B0E20
006B0E13 50 push eax
006B0E14 68 70AAB400 push asktao.00B4AA70 ; event_name = %s
006B0E19 68 7A300000 push 0x307A
006B0E1E EB 22 jmp short asktao.006B0E42
006B0E20 8B16 mov edx,dword ptr ds:[esi]
006B0E22 8B82 E4000000 mov eax,dword ptr ds:[edx+0xE4]
006B0E28 8BCE mov ecx,esi
006B0E2A FFD0 call eax
006B0E2C 50 push eax
006B0E2D 68 F85BB100 push asktao.00B15BF8 ; id = %d
006B0E32 68 64200000 push 0x2064
006B0E37 6A 01 push 0x1
006B0E39 E8 B2A2F1FF call asktao.005CB0F0
006B0E3E 83C4 08 add esp,0x8
006B0E41 50 push eax
006B0E42 E8 398F0100 call asktao.006C9D80
006B0E47 8B0D 4C91D000 mov ecx,dword ptr ds:[0xD0914C]
006B0E4D 83C4 0C add esp,0xC
006B0E50 85C9 test ecx,ecx
006B0E52 74 09 je short asktao.006B0E5D