I am doing some reverse engineering and want to know which APIs are called from the executable. I am mostly interested in the APIs called on a particular Windows system DLL.
I guess one way to do that is to get all APIs exposed from the DLL using dumpbin and put breakpoints on all those from Windbg.
Any other approach? This seems like lot of time if I need to monitor many system DLLs.
BTW, I am working on Windows XP and want to monitor one executable which calls some Windows system DLL functions.