
Create a backup image for the case some malware infects the system and makes it unusable. Second best idea: Use a permanently offline secondary computer. This only adds to the uncertainty and is – in my opinion – a try to discourage people from using “pirating tools”. You get heuristic hits often (“heu-”, “gen-”, “generic-” in the name). On the other side: Many scanners treat keygens/cracks… cross-the-board as malicious.

Running the file on a test computer → You may not see the malicious behavior at first.Simply running the file on a VM → (unlikely for malware in the wild, but possible) Malware might infect the host system with a VM-escape exploit.Simply running the file on a virtual machine → Malware may behave innocent.The attribute “trusted” for a site that distributes illegal copies sounds a bit odd.

Besides… cracking the malware scanner on your system is not very smart in my opinion. Other than a real malware analysis, which only an expert can do, there is no fully reliable method of telling if a file is malicious.
