You cannot debug or step into kernel calls, like syscall's using just x32dbg, x64dbg or any other pure userspace debugger. Use windbg in live (kernel) mode instead, if you need to see what's happening in this syscall. But even with windbg you cannot step into syscall, but just set conditional breakpoint on syscall handler (can be obtained by reading MSRs) with EAX==0xE5.
|