Good day.
Situation: I will disassemble the application and see such a piece in the resulting code:
e8ae5f0100 call 0x000adace _myFunc Those. The disassembler from the hexadecimal code ( e8ae5f0100 ) received the address of the called block ( 0x000adace ) and, using it, found a line in the binary with the name of this block ( "_myFunc" ).
Question: how to manually get the address of this called section, knowing only a sequence of codes, for example, e8ae5f0100 .
It is well known that it is the function that is called, and not some local block.
