Situation: I will disassemble the application and see such a piece in the resulting code:
e8ae5f0100 call 0x000adace _myFunc
Those. The disassembler from the hexadecimal code (
e8ae5f0100 ) received the address of the called block (
0x000adace ) and, using it, found a line in the binary with the name of this block (
Question: how to manually get the address of this called section, knowing only a sequence of codes, for example,
It is well known that it is the function that is called, and not some local block.