How can I access the raw stack data? MS callback proc prototype changes when asm starts popping the stack

Well the named Enumerated Types like DabDump and BinRes are interesting. I didnt quite know what to expect.

DabDump shows the ABC classes
ABEIP_RSC
ABERROR_RSC
ABPOPUP_RSC
ABQUERY_RSC
ABUTIL_RSC
and then procedures with windows (and possibly source code files havent tested) in either 8.3 or long filename form, ie the _RSC = the clw filename.

BinRes Debugview shows
RCDBGSVC
RCDBGSYS
RCDBGSYS64

Edit.
Its surprising what can be stuffed inside resource files. Here’s one example “encrypted” with the XOR97 function.
Mikko Hypponen: Fighting viruses, defending the net - YouTube

I’m getting the impression, looking at a variety of exe’s and dll’s that nobody bothers with language files.
Some resource files dont even have a language ID, but most are the system defaults.