During an analysis, I have found a call to ZwContinue
. The executable file first gets the address of ntdll.NtContinue
and stores it in the EAX register.
After I step over the following assembly line,
CALL EAX ; ntdll.ZwContinue
then OllyDbg (v1.10) terminates the process.
I have found out that this is a kind of anti-debugging mechanism but I could not figure out how to defeat it.
Is there any plugin which I can use or any other helpful trick?
NtContinue
is in fact identical toZwContinue
. More of theseNt*
/Zw*
pairs exist and they are usually the primary system services. In kernel mode these functions also exist, but differ. One of them (don't remember which) will have access checks in place when called from user mode, whereas the other is meant to be used from a kernel mode caller exclusively. – 0xC0000022L Jul 10 '18 at 08:17