Good day.
Situation: I will disassemble the application and see such a piece in the resulting code:
e8ae5f0100 call 0x000adace _myFunc
Those. The disassembler from the hexadecimal code ( e8ae5f0100
) received the address of the called block ( 0x000adace
) and, using it, found a line in the binary with the name of this block ( "_myFunc"
).
Question: how to manually get the address of this called section, knowing only a sequence of codes, for example, e8ae5f0100
.
It is well known that it is the function that is called, and not some local block.