0046BB4F 83C7 04 add edi, 4
0046BB52 A9 00000080
test
eax, 80000000
0046BB57 74 08 je short 0046BB61
0046BB59 25 FFFF0000 and eax, 0FFFF
0046BB5E 50 push eax
0046BB5F EB 06 jmp short 0046BB67
0046BB61 01E8 add eax, ebp
0046BB63 83C0 02 add eax, 2
0046BB66 50 push eax
0046BB67 53 push ebx
0046BB68 FFD6 call esi
0046BB6A 5A pop edx
0046BB6B 59 pop ecx
0046BB6C 85C0
test
eax, eax
0046BB6E ^ 0F84 DAFEFFFF je 0046BA4E
0046BB74 8038 CC
cmp
byte ptr [eax], 0CC
0046BB77 ^ 0F84 D1FEFFFF je 0046BA4E
0046BB7D 8902 mov dword ptr [edx], eax ;填充地址
0046BB7F 83C2 04 add edx, 4
0046BB82 ^ EB A4 jmp short 0046BB28
0046BB84 5F pop edi
0046BB85 83C1 14 add ecx, 14
0046BB88 8379 0C 00
cmp
dword ptr [ecx+C], 0
0046BB8C ^ 0F85 65FFFFFF jnz 0046BAF7
0046BB92 90 nop ;这里F4完成IAT解密过程
0046BB93 EB 04 jmp short 0046BB99