In one of my runs, when executing the "shl dword ptr ss:[rsp+rcx*1-0x5D], cl" instruction, the cc_src in it is somehow equal to eip. This causes the calculated eflags to be wrong. When I tried to debug it, I found that the relevant code is dynamic code(Just like in the picture). How can I debug the relevant code of unicorn? Should I look at the assembly of the dynamic code line by line, or is there any other better way? Sorry, this question may be stupid.
In one of my runs, when executing the "shl dword ptr ss:[rsp+rcx*1-0x5D], cl" instruction, the cc_src in it is somehow equal to eip. This causes the calculated eflags to be wrong. When I tried to debug it, I found that the relevant code is dynamic code(Just like in the picture). How can I debug the relevant code of unicorn? Should I look at the assembly of the dynamic code line by line, or is there any other better way? Sorry, this question may be stupid.