Just because some code that's virtualized causes a flag, doesn't mean it's malicious. This is a pretty bad place to try to hide malicious code anyways. Here's a tip:
The key is using xor transformations aswell as the system entropy. Your best bet is to try to understand how it's manipulating memory.
|
==> |