If you are going to turn your code in to bullshit then the answer is buying a code signing certificate.
These kinds of destructive operations are the same thing done by exploit kits such as Veil <https://github.com/Veil-Framework/Veil> to bypass heuristical scans.