I will try to see this in the context of programming as reverse engineering. Here are some things you could do:
- Get an idea of which APIs are called using the depend.exe file from the Microsoft SDK. You can also see what characters it refers to.
- procexp.exe/tcpview.exe/filemon.exe/regmon http://www.sysinternals.com, .
- WinDbg Microsoft, , .
, , . , , , .
user257111