The compiler analyzed it, optimized it, and emitted precisely the machine instructions you expected. Same input, same output.
A security researcher published details of three security vulnerabilities in Windows Defender, and the code used to exploit ...