Open ghost opened 5 years ago
@PeterMatula can you please verify?
I've just realized that it might be because as IDA shows the call instruction itself is not in the "scope" of WinMain, but comes right after a jump. Just a theoretical question: Do you think it's okay like this? I mean not showing any disassembled code for the jump taken?
The empty body with return 0
that we generate seems definitely fishy. @PeterMatula will look into this and will let you know.
98acc7530cf84c731ff1f42de12b6c21b1ac3778.zip
Decompiling the uploaded file (password is: 'infected' and as obviously be warned that the file itself is malicious) gives the following decompilation:
The IDA disassembly shows the following code:
Even if the jump and other not interesting instructions are optimized away by RetDec, my opinion is that important call instruction shouldn't be skipped.