
2017-07-24 SHL

http://trac.netlabs.org/efte/ticket/75

IBM OS/2 Dump Formatter for a retail or an hstrict SMP kernel.
Formatter is --> Internal revision 14.106_SMP
Dump file is --> Internal revision 14.109_SMP (process dump)

-- This is probably Holger's patched kernel.

Symbol (d:\devtools\pmdf\14_106_smp_t60\os2krnlr.sym) linked

Current slot number: 0106

 Slot  Pid  Ppid Csid Ord  Sta Pri  pTSD     pPTDA    pTCB     Disp SG Name
*0106# 0134 0033 0134 0002 run 0500 f9282000 f984a7c0 f93a2030 0940 1f EFTEPM

eax=00000001 ebx=70207020 ecx=70207020 edx=70207020 esi=70207020 edi=70207020
eip=70207020 esp=00db9a9c ebp=70207020 iopl=0 rf -- -- nv up ei pl nz ac pe nc
cs=005b ss=0053 ds=0053 es=0053 fs=150b gs=0000 cr2=00000000 cr3=00000000 p=01

Invalid linear address: 005b:70207020

# .h
IBM OS/2 Dump Formatter for a retail or an hstrict SMP kernel.
Formatter is --> Internal revision 14.106_SMP
Dump file is --> Internal revision 14.109_SMP (process dump)

Dump Requested:           01/08/2017 - 10:18:34
Dump Started:             01/08/2017 - 10:18:35
Dump Completed:           01/08/2017 - 10:18:36
Free Space Req/Actual:    10240K / 4194303K
Dump File size:           69260672
Dump state:               Normal
Dump cause:               Trap
Kernel type:              retail smp
Trap type:                0000000e
Key Pid/Tid/Slot:         0x0134/0x0002/0x0106
Req Pid/Tid:              0x0134/0x0002
Sys Collected Data:       000c1070

Defaults for System level (PDUMPSYS) dumps:
    SYSSUMM IDT SYSFS SYSVM SYSTK SYSSEM TRACE STRACE SMP SYSIO SYSPG

Defaults for User level (PDUMPUSR) dumps:
    SUMM PRIVATE SHARED INSTANCE MVDM SEM SYSLDR SYSFS SYSVM SYSSEM SYSIO SYSPG

Original Dump Filename:     P:\EFTE\DUMP\PDUMP.001

PID:134
  Requested Information:
    Children:0  Parents:0  Kill:N
    SUMM PRIVATE SHARED INSTANCE MVDM SEM SYSLDR SYSFS SYSVM SYSSEM SYSIO SYSPG
  ** ALL data collected **

TRAP SCREEN INFORMATION

------------------------------------------------------------
Trap screen 1 found at address #70:989c
This screen is most likely related to a previous trap.

P1=00000001  P2=70207020  P3=XXXXXXXX  P4=XXXXXXXX
CS:EIP=005b:70207020  CSACC=f0df  CSLIM=ffffffff
SS:ESP=0053:00db9a9c  SSACC=f0f3  SSLIM=ffffffff
EBP=70207020  FLG=00010216
EAX=00000001  EBX=70207020  ECX=70207020  EDX=70207020
ESI=70207020  EDI=70207020
DS=0053  DSACC=f0f3  DSLIM=ffffffff
ES=0053  ESACC=f0f3  ESLIM=ffffffff
FS=150b  FSACC=00f3  FSLIM=00000030
GS=0000  GSACC=****  GSLIM=*******

No Symbols Found

------------------------------------------------------------------------


 XWPHOOK   03/29/2016 01:10:00      33,546  M:\XWORKPLACE\BIN\XWPHOOK.DLL
 PMMERGE   11/23/2014 18:39:22   1,754,169  M:\OS2\DLL\PMMERGE.DLL

# .p
 Slot  Pid  Ppid Csid Ord  Sta Pri  pTSD     pPTDA    pTCB     Disp SG Name
 0105  0134 0033 0134 0001 crt 0500 f9281000 f984a7c0 f93a1d2c 0f10 1f EFTEPM
*0106# 0134 0033 0134 0002 run 0500 f9282000 f984a7c0 f93a2030 0940 1f EFTEPM

------------------------------------------------------------------------

-- Peek at thread 1

# .s 105
Current slot number: 0105

# r
eax=00000bb8 ebx=001c9561 ecx=00000000 edx=00000000 esi=1d684fbc edi=ffffffff
eip=1fcaf331 esp=0059eee8 ebp=0059ef20 iopl=0 -- -- -- nv up ei pl zr na pe nc
cs=005b ss=0053 ds=0053 es=0053 fs=150b gs=0000 cr2=00000000 cr3=00000000 p=**
005b:1fcaf331 83c40c         add       esp,+0c

# ln
%1fcaf1bc PMMERGE SleepPmq + 175

Analyzing Call Gate ...
 is in a call to:
%1ffc09a0 DOSCALL1 DOS32PMWAITEVENTSEM

# k
005b:1fcb3c31 00000bff ffffffff 00000000 0059ef5c [PMMERGE WIN32PEEKMSG + c4d]

# %findsym
Finding from 0059ede8 to 0059efe8 by dword
59ee08: 1fc01a02 = MatchColorDirectDefaultPalette + c86         ; PMMERGE
59ee30: 1fc4497c = UpdatePhyColorAttributes + 3e4
59eedc: 00072dc6 = GFrame__InsertView + 2e
59eee4: 1fcaf331 = SleepPmq + 175
59ef04: 00072fff = GFrame__SetMenu + 3f
59ef24: 1fcb3c31 = WIN32PEEKMSG + c4d
59ef38: 00070001 = AVIOWndProc + 439
59efac: 1fcb1893 = WIN32GETMSG + 23
59efd0: 00073721 = GUI__RunProgram + 75
59f018: 00067c17 = main + b3
Scan stopped at 59f068 stopaddr 59efe8

------------------------------------------------------------------------

-- Back to trapping thread

# .s*

# .p#
 Slot  Pid  Ppid Csid Ord  Sta Pri  pTSD     pPTDA    pTCB     Disp SG Name
*0106# 0134 0033 0134 0002 run 0500 f9282000 f984a7c0 f93a2030 0940 1f EFTEPM

# .pu#
 Slot  Pid  Ord  pPTDA    Name     pstkframe  CS:EIP        SS:ESP     cbargs
*0106# 0134 0002 f984a7c0 EFTEPM   %f9282f38 005b:70207020 0053:00db9814 0000

# dd 00db9a9c (from trap scree)
0053:00db9a9c  70207020 70207020 70207020 70207020
0053:00db9aac  70207020 70207020 70207020 70207020
0053:00db9abc  70207020 70207020 70207020 70207020
0053:00db9acc  70207020 70207020 70207020 70207020
0053:00db9adc  70207020 70207020 70207020 70207020
0053:00db9aec  70207020 70207020 70207020 70207020
0053:00db9afc  70207020 70207020 70207020 00db9bd8
0053:00db9b0c  00db9bd8 00db9bdc 00000000 00000000
0053:00db9b1c  1d6ef038 1d6da248 1d6da248 00000000

-- Stack is trashed

# da %1d6da248
%1d6da248 WARPSANS

# da %1d6da248
%1d6da248 WARPSANS

-- Code may have been doing font action or this might just be leftovers.

hookSendMsgHook stack frame - maybe
                                 eip      hwnd
0053:00db9b2c  0000000c 00db9b80 1e05083f 80000043
               msg      mp1      mp2
0053:00db9b3c  00000008 00db9c50 00000000 00db9bd8
0053:00db9b4c  00000000 00db9bd8 1fcda7bb 00000004
0053:00db9b5c  00000004 00000000 1fcfbe02 00000009
0053:00db9b6c  00000000 1d6d03d4 1d6cf670 00db9cf4
0053:00db9b7c  00db9bb8 1fcb2f51 1fac0613 1dd2af80
0053:00db9b8c  0007a2c6 fffffffc 1d6cf670 00db9cf4

# ln %1e05083f
%1e050000 XWPHOOK G_HookData + 83f              ; hookSendMsgHook + 2c

-- #define WM_ADJUSTWINDOWPOS         0x0008

-- Send hook handling WM_ADJUSTWINDOWPOS

# dd 00db9c50 (PSWP) - gibberish - probably overwritten

           fl       cy       cx       y
%00db9c50  00008000 00000001 00000001 00000001          SWP_NOAUTOCLOSE
           x        hwndIns
%00db9c60  00000001 00000001 00000001 00000001
%00db9c70  00000001 00000001 00000001 1d684a4a
%00db9c80  00000000 00000000 00000000 00000000

# .m %1e05083f
*har     par      cpg        va    flg next prev link hash hob   hal
 0d2b %fdfa91bc 00000010 %1e050000 3d9 0d2a 0d2c 0000 0000 0ea9 0000  hco=02a2a
 hob   har hobnxt flgs own  hmte  sown,cnt lt st xf
 0ea9  0d2b 0000  0838 0ea7 0ea7  0000 00  00 00 00 shared    m:xwphook.dll

TCBOrdinal                      : 0002

TCBptib                         : %005b0060

# %tib %005b0060

tib_pexchain   ffffffff tib_pstack  00da0000 tib_pstacklimit 00dba000
tib_ptib2      005b0078 tib_version 00000014 tib_ordinal     00000106

tib2_ultid     00000002 tib2_ulpri        00000200 tib2_version 00000014
tib2_usMCCount 0000     tib2_fMCForceFlag 0000

? 00dba000 - 00da0000 = 0001a000H       ; stack size

# %findsym 00db6000 00dba000
Finding from 00db6000 to 00dba000 by dword
db85e4: 0007eea9 = _parse_tz + 49
db85fc: 0007eb1b = _CacheOSTZ + 18b
db8604: 000abb70 = __end_dst + 30
db8608: 000abb70 = __end_dst + 30
db8648: 000abb70 = __end_dst + 30
db8650: 000abb4c = __end_dst + c
db8654: 0007f592 = _isindst + 212
db8668: 0007f164 = _brktime + 64
db868c: 000790f9 = write + 49
db86ac: 0007ea24 = _CacheOSTZ + 94
db86dc: 000773d8 = tmpnam + c8
db8774: 0007eea9 = _parse_tz + 49
db878c: 0007eb1b = _CacheOSTZ + 18b
db8794: 000abb70 = __end_dst + 30
db8798: 000abb70 = __end_dst + 30
db87d8: 0007a271 = _OS2RemoveThread + 41
db87e0: 0007a179 = _AllocInitThreadData + 19
db87f8: 00074ffb = _open_flags + b
db881c: 00074ca0 = use_os2_high_mem + 10
db882c: 00061238 = FileInfo__FileInfo + 28
db8838: 000614b9 = FileFind__FindFirst + 1a1
db8928: 00060a53 = SlashDir + 4b
db8978: 00060d9e = ExpandPath + 236
db8988: 0007eea9 = _parse_tz + 49
db89a0: 0007eb1b = _CacheOSTZ + 18b
db89a8: 000abb70 = __end_dst + 30
db89ac: 000abb70 = __end_dst + 30
db89ec: 000abb70 = __end_dst + 30
db89f4: 000abb4c = __end_dst + c
db89f8: 0007f592 = _isindst + 212
db8a0c: 0007f164 = _brktime + 64
db8a30: 000790f9 = write + 49
db8a50: 0007ea24 = _CacheOSTZ + 94
db8a80: 000773d8 = tmpnam + c8
db8b7c: 0007eea9 = _parse_tz + 49
db8b94: 0007eb1b = _CacheOSTZ + 18b
db8b9c: 000abb70 = __end_dst + 30
db8ba0: 000abb70 = __end_dst + 30
db8bb4: 1ffc77d9 = HT32_Exit + 5
db8bc0: 1ffc7de1 = THK32XHNDLR
db8bec: 1ffc3e8b = DOS32FINDNEXT + 3b
db8c34: 00061506 = FileFind__FindNext + 3a
db8ccc: 00060a53 = SlashDir + 4b
db8d1c: 00060d9e = ExpandPath + 236
db8d58: 1ffca438 = _xcptGPFDefaultAction + a0
db8d70: 1ffc9e7d = DOS32R3EXCEPTIONDISPATCHER + 165
db8eb4: 000751a9 = _open_flags + 1b9
db8edc: 0002c000 = EBuffer__UnTabPoint + a8
db8f14: 1ffc0053 = DOS32QUERYSYSINFO + a
db8f38: 000a0c40 = HistoryFileName + 30
db8f50: 1ffc87bc = DOS32OPENL
db8f60: 1ffc881b = DOS32OPENL + 5f
db8f68: 1ffc77d9 = HT32_Exit + 5
db8f74: 1ffc7de1 = THK32XHNDLR
db8f7c: 1ffc87bc = DOS32OPENL
db8f9c: 1ffc77d9 = HT32_Exit + 5
db8fa4: 1ffc2526 = DOS32READ + 2a
db8fac: 000acfc0 = FileBuffer + 30
db8fc4: 1ffc77d9 = HT32_Exit + 5
db8fd4: 000acfc0 = FileBuffer + 30
db8fec: 0007a271 = _OS2RemoveThread + 41
db8ff4: 0007a179 = _AllocInitThreadData + 19
db90c4: 1ffc5e51 = DOS32WRITE + 29
db90e4: 1ffc5e51 = DOS32WRITE + 29
db912c: 1ffc5e51 = DOS32WRITE + 29
db956c: 1ffc5e51 = DOS32WRITE + 29
db963c: 1ffc77d9 = HT32_Exit + 5
db9684: 1ffc77d9 = HT32_Exit + 5
db96ec: 1fcbcda0 = DoEnableSubfunction + 58
db96f8: 1fcbab2f = ResetDC32 + 5fb
db970c: 1fcbac04 = ResetDC32 + 6d0
db9744: 11ef3c1c = p:eftepm.exe 0004:15388              ; %11ef3c1c M:\OS2\DLL\DOSCALL1.DLL
db9758: 11eb1314 = p:exceptq.dll 0001:4884
db976c: 1fcc1d8a = InvertCursor + 262

db9788: 1ffca2ee = _xcptExecuteUserExceptionHandler + 46
db978c: 1ffc1b7f = DOS32UNSETEXCEPTIONHANDLER + 3b
db9794: 1ffca30d = _xcptExecuteUserExceptionHandler + 65
db97a8: 1ffca330 = _xcptR3ExceptionHandler
db97c4: 1ffc9f9a = _xcptR3ExceptionDispatcher + 10e

db97d8: 1fcd87ea = ShowCursor + 5e
db97e0: 1fac0613 = m:pmgre.dll 0002:1555
db97e8: 1fcc914c = WIN32SHOWCURSOR + 38
db97f4: 00071f5d = GView__xGView + 4d

db9810: 1ffc9e7d = DOS32R3EXCEPTIONDISPATCHER + 165
db9974: fff42309 = _PGPageFault + 446

db9b34: 1e05083f = G_HookData + 83f             hookSendMsgHook + 2c
db9b54: 1fcda7bb = GetHookToCall + 1e3          PMMERGE
db9b64: 1fcfbe02 = WinQueueWndProc + e
db9b80: 1fcb2f51 = CallSendMsgHook + 17d
db9b84: 1fac0613 = m:pmgre.dll 0002:1555
db9b8c: 0007a2c6 = _InitMultipleThread + 46     ; EFTEPM data
db9ba0: 1e050cee = G_HookData + cee             ; hookInputHook + ee
db9bac: 1fac0613 = m:pmgre.dll 0002:1555
db9bb4: 1fcda7bb = GetHookToCall + 1e3
db9bc0: 1e050cee = G_HookData + cee
db9be0: 1fcb2dac = CallInputHook + 174
db9be8: 1fcb2dc6 = CallInputHook + 18e          PMMERGE
db9bf4: 1fcbd4f2 = ReadMessage + 182
db9c2c: 1fcb371a = WIN32PEEKMSG + 736
db9c48: 00200bff = p:eftepm.exe 0003:1510399
db9c4c: 1fcb371a = WIN32PEEKMSG + 736
db9ca8: 0007a2c6 = _InitMultipleThread + 46
db9cb8: 00074603 = assert99 + c3
db9cc0: 0009c004 = p:eftepm.exe 0003:49156
db9cd0: 000723af = GView__IsActive + 3
db9cd8: 00051467 = GxView__Resize + 1f
db9ce8: 0009c004 = p:eftepm.exe 0003:49156
db9cf0: 00070a00 = ConGetEvent + 1cc
db9d04: 001c9464 = p:eftepm.exe 0003:1283172
db9d1c: 0059efe0 = p:eftepm.exe 0003:5304288
db9d28: 0007360a = GUI__ProcessEvent + 6e
db9d34: 0007368c = GUI__Run + 64
db9d48: 000711de = ConGetEvent + 9aa
db9d50: 000aacd0 = tools + 14
db9d54: 0007a2c6 = _InitMultipleThread + 46
db9d64: 0059efe0 = p:eftepm.exe 0003:5304288
db9d70: 0009d2f4 = ::min_capacity + 364
db9d7c: 00071263 = GViewPeer__GViewPeer + 63
db9e88: 11eb1270 = p:exceptq.dll 0001:4720
db9e9c: 0009a047 = p:eftepm.exe 0003:41031
db9eb4: 000804a6 = calloc + 6
db9fe4: 0007107c = ConGetEvent + 848
db9ffc: 0059efe0 = p:eftepm.exe 0003:5304288
Invalid address type: 402 - %00dba000
Scan stopped at dba000 stopaddr dba000

-- Stack trashed from approx

%00db99e4  00000053 00000053 70207020 70207020

-- to

%00db9afc  70207020 70207020 70207020 00db9bd8

-- 00db9afc + c - 00db99e4 - 8 = 011cH = 284T

------------------------------------------------------------------------

# u %G_HookData + 83f                   ( in hookSendMsgHook + 2c )

%1e05083f 83c410             add       esp,+10
%1e050842 f605e800641a20     test      byte ptr [1a6400e8],20 ;' '

# u %G_HookData + 83f-5
%1e05083a e89efeffff         call      %1e0506dd
%1e05083f 83c410             add       esp,+10

#ln %1e0506dd
%1e050000 XWPHOOK G_HookData + 6dd

# u %1e0506dd   ProcessMsgsForWinlist

%1e0506dd 55                 push      ebp
%1e0506de 8bec               mov       ebp,esp
%1e0506e0 83ec20             sub       esp,+20          ;' '
%1e0506e3 53                 push      ebx
%1e0506e4 83fa01             cmp       edx,+01          ; arg2  WM_CREATE
%1e0506e7 57                 push      edi
%1e0506e8 894d10             mov       dword ptr [ebp+10],ecx
%1e0506eb 89550c             mov       dword ptr [ebp+0c],edx
%1e0506ee 894508             mov       dword ptr [ebp+08],eax
%1e0506f1 7422               jz        %1e050715
%1e0506f3 83fa02             cmp       edx,+02          ; WM_
%1e0506f6 741d               jz        %1e050715
%1e0506f8 83fa0d             cmp       edx,+0d
%1e0506fb 7418               jz        %1e050715
%1e0506fd 83fa55             cmp       edx,+55          ;'U'
%1e050700 7413               jz        %1e050715
%1e050702 83fa0a             cmp       edx,+0a
%1e050705 7505               jnz       %1e05070c
%1e050707 f60101             test      byte ptr [ecx],01
%1e05070a 7509               jnz       %1e050715
%1e05070c 83fa47             cmp       edx,+47          ;'G'
%1e05070f 0f85fc000000       jnz       %1e050811        ; goto exit

%1e050715 8bd8               mov       ebx,eax
%1e050717 6a05               push      +05
%1e050719 53                 push      ebx
%1e05071a e8c124c601         call      %1fcb2be0        ; PMMERGE WIN32QUERYWINDOW
%1e05071f 83c408             add       esp,+08
%1e050722 3905c40f641a       cmp       dword ptr [1a640fc4],eax ; hwnd 80000001
%1e050728 0f85e3000000       jnz       %1e050811
%1e05072e 391da40f641a       cmp       dword ptr [1a640fa4],ebx ; hwnd 8000008a
%1e050734 0f84d7000000       jz        %1e050811

%1e05073a 55                 push      ebp
%1e05073b 8d7de0             lea       edi,[ebp-20]
%1e05073e 57                 push      edi
%1e05073f 6a1e               push      +1e
%1e050741 53                 push      ebx
%1e050742 e8b9fcc501         call      %1fcb0400        ; PMMERGE WIN32QUERYCLASSNAME
%1e050747 83c410             add       esp,+10
%1e05074a 8bcf               mov       ecx,edi
%1e05074c 85c0               test      eax,eax
%1e05074e 0f84bd000000       jz        %1e050811        ; fail

%1e050754 bf4c00061e         mov       edi,1e06004c     ; "#1"
%1e050759 8bd1               mov       edx,ecx
%1e05075b 33c0               xor       eax,eax
%1e05075d 33db               xor       ebx,ebx
%1e05075f 90                 nop

%1e050760 8a02               mov       al,byte ptr [edx]
%1e050762 8a1f               mov       bl,byte ptr [edi]
%1e050764 42                 inc       edx
%1e050765 47                 inc       edi
%1e050766 84db               test      bl,bl
%1e050768 7404               jz        %1e05076e

%1e05076a 3ac3               cmp       al,bl
%1e05076c 74f2               jz        %1e050760

%1e05076e 2bc3               sub       eax,ebx
%1e050770 0f8457000000       jz        %1e0507cd

%1e050776 bf9c00061e         mov       edi,1e06009c     ; "wpFolder window"
%1e05077b 8bd1               mov       edx,ecx
%1e05077d 33c0               xor       eax,eax
%1e05077f 33db               xor       ebx,ebx
%1e050781 8a02               mov       al,byte ptr [edx]
%1e050783 8a1f               mov       bl,byte ptr [edi]
%1e050785 42                 inc       edx
%1e050786 47                 inc       edi
%1e050787 84db               test      bl,bl
%1e050789 7404               jz        %1e05078f
%1e05078b 3ac3               cmp       al,bl
%1e05078d 74f2               jz        %1e050781
%1e05078f 2bc3               sub       eax,ebx
%1e050791 743a               jz        %1e0507cd
%1e050793 bfac00061e         mov       edi,1e0600ac
%1e050798 8bd1               mov       edx,ecx
%1e05079a 33c0               xor       eax,eax
%1e05079c 33db               xor       ebx,ebx
%1e05079e 8bc0               mov       eax,eax
%1e0507a0 8a02               mov       al,byte ptr [edx]
%1e0507a2 8a1f               mov       bl,byte ptr [edi]
%1e0507a4 42                 inc       edx
%1e0507a5 47                 inc       edi
%1e0507a6 84db               test      bl,bl
%1e0507a8 7404               jz        %1e0507ae
%1e0507aa 3ac3               cmp       al,bl
%1e0507ac 74f2               jz        %1e0507a0
%1e0507ae 2bc3               sub       eax,ebx
%1e0507b0 741b               jz        %1e0507cd
%1e0507b2 babc00061e         mov       edx,1e0600bc
%1e0507b7 33c0               xor       eax,eax
%1e0507b9 33db               xor       ebx,ebx
%1e0507bb 8a01               mov       al,byte ptr [ecx]
%1e0507bd 8a1a               mov       bl,byte ptr [edx]
%1e0507bf 41                 inc       ecx
%1e0507c0 42                 inc       edx
%1e0507c1 84db               test      bl,bl
%1e0507c3 7404               jz        %1e0507c9
%1e0507c5 3ac3               cmp       al,bl
%1e0507c7 74f2               jz        %1e0507bb
%1e0507c9 2bc3               sub       eax,ebx
%1e0507cb 7544               jnz       %1e050811

%1e0507cd 837d0c47           cmp       dword ptr [ebp+0c],+47 ;'G'
%1e0507d1 7522               jnz       %1e0507f5
%1e0507d3 8b4d10             mov       ecx,dword ptr [ebp+10]
%1e0507d6 8b5d08             mov       ebx,dword ptr [ebp+08]
%1e0507d9 51                 push      ecx
%1e0507da 53                 push      ebx
%1e0507db 8b1d1000641a       mov       ebx,dword ptr [1a640010]
%1e0507e1 68ab110000         push      000011ab
%1e0507e6 53                 push      ebx
%1e0507e7 e8cc58c601         call      %1fcb60b8        ; PMMERGE WIN32POSTMSG

%1e0507ec 83c410             add       esp,+10
%1e0507ef 5f                 pop       edi
%1e0507f0 5b                 pop       ebx
%1e0507f1 8be5               mov       esp,ebp
%1e0507f3 5d                 pop       ebp
%1e0507f4 c3                 retd

%1e0507f5 8b5d0c             mov       ebx,dword ptr [ebp+0c]
%1e0507f8 53                 push      ebx
%1e0507f9 8b5d08             mov       ebx,dword ptr [ebp+08]
%1e0507fc 53                 push      ebx
%1e0507fd 8b1d1000641a       mov       ebx,dword ptr [1a640010]
%1e050803 68aa110000         push      000011aa
%1e050808 53                 push      ebx
%1e050809 e8aa58c601         call      %1fcb60b8        ; PMMERGE WIN32POSTMSG
%1e05080e 83c410             add       esp,+10
%1e050811 ebdc               jmp       %1e0507ef
%1e050813 55                 push      ebp
%1e050814 8bec               mov       ebp,esp
%1e050816 83ec30             sub       esp,+30          ;'0'
%1e050819 53                 push      ebx
%1e05081a 833dac0f641a00     cmp       dword ptr [1a640fac],+00
%1e050821 57                 push      edi
%1e050822 0f858f000000       jnz       %1e0508b7

%1e050828 8b5d0c             mov       ebx,dword ptr [ebp+0c]
%1e05082b 8b03               mov       eax,dword ptr [ebx]
%1e05082d 8b4b04             mov       ecx,dword ptr [ebx+04]
%1e050830 50                 push      eax
%1e050831 8b5308             mov       edx,dword ptr [ebx+08]
%1e050834 83ec0c             sub       esp,+0c
%1e050837 8b430c             mov       eax,dword ptr [ebx+0c]
%1e05083a e89efeffff         call      %1e0506dd                ; G_HookData + 6dd ProcessMsgsForWinlist
%1e05083f 83c410             add       esp,+10
%1e050842 f605e800641a20     test      byte ptr [1a6400e8],20 ;' '
%1e050849 0f8468000000       jz        %1e0508b7
%1e05084f 837b0855           cmp       dword ptr [ebx+08],+55 ;'U'
%1e050853 7562               jnz       %1e0508b7
%1e050855 8b4304             mov       eax,dword ptr [ebx+04]
%1e050858 85c0               test      eax,eax
%1e05085a 745b               jz        %1e0508b7
%1e05085c f60004             test      byte ptr [eax],04
%1e05085f 7456               jz        %1e0508b7
%1e050861 a1a40f641a         mov       eax,dword ptr [1a640fa4]
%1e050866 39430c             cmp       dword ptr [ebx+0c],eax
%1e050869 744c               jz        %1e0508b7
%1e05086b 55                 push      ebp
%1e05086c 50                 push      eax
%1e05086d e8feddc601         call      %1fcbe670                ; PMMERGE WIN32ISWINDOWVISIBLE
%1e050872 83c408             add       esp,+08

%1e050875 85c0               test      eax,eax
%1e050877 743e               jz        %1e0508b7

%1e050879 6a05               push      +05
%1e05087b 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e05087e 51                 push      ecx
%1e05087f e85c23c601         call      %1fcb2be0                ; PMMERGE WIN32QUERYWINDOW
%1e050884 83c408             add       esp,+08
%1e050887 3905c40f641a       cmp       dword ptr [1a640fc4],eax
%1e05088d 7528               jnz       %1e0508b7

%1e05088f 55                 push      ebp
%1e050890 ff05ac0f641a       inc       dword ptr [1a640fac]     ; is 0
%1e050896 6a04               push      +04
%1e050898 8b0da40f641a       mov       ecx,dword ptr [1a640fa4]
%1e05089e 6a00               push      +00
%1e0508a0 6a00               push      +00
%1e0508a2 6a00               push      +00
%1e0508a4 6a00               push      +00
%1e0508a6 6a03               push      +03
%1e0508a8 51                 push      ecx
%1e0508a9 e8fe2dc701         call      %1fcc36ac                ; PMMERGE WIN32SETWINDOWPOS
%1e0508ae 83c420             add       esp,+20          ;' '
%1e0508b1 ff0dac0f641a       dec       dword ptr [1a640fac]
%1e0508b7 8b5d0c             mov       ebx,dword ptr [ebp+0c]
%1e0508ba 837b0855           cmp       dword ptr [ebx+08],+55 ;'U'
%1e0508be 7546               jnz       %1e050906
%1e0508c0 833d8c00641a00     cmp       dword ptr [1a64008c],+00
%1e0508c7 743d               jz        %1e050906
%1e0508c9 833d9000641a00     cmp       dword ptr [1a640090],+00
%1e0508d0 7434               jz        %1e050906
%1e0508d2 8b0d3010641a       mov       ecx,dword ptr [1a641030]
%1e0508d8 3b4b0c             cmp       ecx,dword ptr [ebx+0c]
%1e0508db 7529               jnz       %1e050906
%1e0508dd 8b5b04             mov       ebx,dword ptr [ebx+04]
%1e0508e0 85db               test      ebx,ebx
%1e0508e2 7422               jz        %1e050906
%1e0508e4 f60310             test      byte ptr [ebx],10
%1e0508e7 741d               jz        %1e050906
%1e0508e9 6a00               push      +00
%1e0508eb 8b1d1000641a       mov       ebx,dword ptr [1a640010]
%1e0508f1 6aff               push      -01
%1e0508f3 6899110000         push      00001199
%1e0508f8 53                 push      ebx
%1e0508f9 e8ba57c601         call      %1fcb60b8        ; PMMERGE WIN32POSTMSG
%1e0508fe 83c410             add       esp,+10
%1e050901 e915010000         jmp       %1e050a1b
%1e050906 833d7800641a00     cmp       dword ptr [1a640078],+00
%1e05090d 0f8408010000       jz        %1e050a1b
%1e050913 f605d000641a01     test      byte ptr [1a6400d0],01

%1e05091a 0f84fb000000       jz        %1e050a1b
%1e050920 8b450c             mov       eax,dword ptr [ebp+0c]
%1e050923 83780833           cmp       dword ptr [eax+08],+33 ;'3'      ; WM_INITMENU
%1e050927 751e               jnz       %1e050947
%1e050929 833d1020641a00     cmp       dword ptr [1a642010],+00
%1e050930 0f85e5000000       jnz       %1e050a1b
%1e050936 8b00               mov       eax,dword ptr [eax]
%1e050938 a31020641a         mov       dword ptr [1a642010],eax
%1e05093d e8a00c0000         call      %1e0515e2                ; XWPHOOK WMMouseMove_AutoHideMouse ???
%1e050942 e9d4000000         jmp       %1e050a1b

%1e050947 83780835           cmp       dword ptr [eax+08],+35 ;'5'      ; WM_MENUEND
%1e05094b 7522               jnz       %1e05096f

------------------------------------------------------------------------

# ln %1e050813
%1e050000 XWPHOOK G_HookData + 813

# u G_HookData + 813 G_HookData + 83f          ; G_HookData + 813 = hookSendMsgHook

%1e050813 55                 push      ebp
%1e050814 8bec               mov       ebp,esp
%1e050816 83ec30             sub       esp,+30          ;'0'
%1e050819 53                 push      ebx
%1e05081a 833dac0f641a00     cmp       dword ptr [1a640fac],+00 ; is 0, G_HookData.cSuppressWinlistNotify
%1e050821 57                 push      edi
%1e050822 0f858f000000       jnz       %1e0508b7

%1e050828 8b5d0c             mov       ebx,dword ptr [ebp+0c]
%1e05082b 8b03               mov       eax,dword ptr [ebx]
%1e05082d 8b4b04             mov       ecx,dword ptr [ebx+04]
%1e050830 50                 push      eax
%1e050831 8b5308             mov       edx,dword ptr [ebx+08]
%1e050834 83ec0c             sub       esp,+0c
%1e050837 8b430c             mov       eax,dword ptr [ebx+0c]
%1e05083a e89efeffff         call      %1e0506dd                ; XWPHOOK G_HookData + 6dd  ProcessMsgsForWinlist
%1e05083f 83c410             add       esp,+10

%1e050842 f605e800641a20     test      byte ptr [1a6400e8],20 ;' '      ; PGRFL_STAYONTOP
%1e050849 0f8468000000       jz        %1e0508b7
%1e05084f 837b0855           cmp       dword ptr [ebx+08],+55 ;'U'      ; WM_WINDOWPOSCHANGED
%1e050853 7562               jnz       %1e0508b7
%1e050855 8b4304             mov       eax,dword ptr [ebx+04]           ; mp1
%1e050858 85c0               test      eax,eax                          ; 0?
%1e05085a 745b               jz        %1e0508b7
%1e05085c f60004             test      byte ptr [eax],04
%1e05085f 7456               jz        %1e0508b7
%1e050861 a1a40f641a         mov       eax,dword ptr [1a640fa4]
%1e050866 39430c             cmp       dword ptr [ebx+0c],eax
%1e050869 744c               jz        %1e0508b7
%1e05086b 55                 push      ebp
%1e05086c 50                 push      eax
%1e05086d e8feddc601         call      %1fcbe670
%1e050872 83c408             add       esp,+08
%1e050875 85c0               test      eax,eax
%1e050877 743e               jz        %1e0508b7
%1e050879 6a05               push      +05
%1e05087b 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e05087e 51                 push      ecx
%1e05087f e85c23c601         call      %1fcb2be0                ; PMMERGE WIN32QUERYWINDOW
%1e050884 83c408             add       esp,+08
%1e050887 3905c40f641a       cmp       dword ptr [1a640fc4],eax
%1e05088d 7528               jnz       %1e0508b7
%1e05088f 55                 push      ebp
%1e050890 ff05ac0f641a       inc       dword ptr [1a640fac]       ; ++G_HookData.cSuppressWinlistNotify
%1e050896 6a04               push      +04
%1e050898 8b0da40f641a       mov       ecx,dword ptr [1a640fa4]
%1e05089e 6a00               push      +00
%1e0508a0 6a00               push      +00
%1e0508a2 6a00               push      +00
%1e0508a4 6a00               push      +00
%1e0508a6 6a03               push      +03
%1e0508a8 51                 push      ecx
%1e0508a9 e8fe2dc701         call      %1fcc36ac
%1e0508ae 83c420             add       esp,+20          ;' '
%1e0508b1 ff0dac0f641a       dec       dword ptr [1a640fac]
%1e0508b7 8b5d0c             mov       ebx,dword ptr [ebp+0c]
%1e0508ba 837b0855           cmp       dword ptr [ebx+08],+55 ;'U'
%1e0508be 7546               jnz       %1e050906
%1e0508c0 833d8c00641a00     cmp       dword ptr [1a64008c],+00
%1e0508c7 743d               jz        %1e050906
%1e0508c9 833d9000641a00     cmp       dword ptr [1a640090],+00
%1e0508d0 7434               jz        %1e050906
%1e0508d2 8b0d3010641a       mov       ecx,dword ptr [1a641030]
%1e0508d8 3b4b0c             cmp       ecx,dword ptr [ebx+0c]
%1e0508db 7529               jnz       %1e050906
%1e0508dd 8b5b04             mov       ebx,dword ptr [ebx+04]
%1e0508e0 85db               test      ebx,ebx
%1e0508e2 7422               jz        %1e050906
%1e0508e4 f60310             test      byte ptr [ebx],10
%1e0508e7 741d               jz        %1e050906
%1e0508e9 6a00               push      +00
%1e0508eb 8b1d1000641a       mov       ebx,dword ptr [1a640010]
%1e0508f1 6aff               push      -01
%1e0508f3 6899110000         push      00001199
%1e0508f8 53                 push      ebx
%1e0508f9 e8ba57c601         call      %1fcb60b8
%1e0508fe 83c410             add       esp,+10
%1e050901 e915010000         jmp       %1e050a1b
%1e050906 833d7800641a00     cmp       dword ptr [1a640078],+00
%1e05090d 0f8408010000       jz        %1e050a1b
%1e050913 f605d000641a01     test      byte ptr [1a6400d0],01
%1e05091a 0f84fb000000       jz        %1e050a1b
%1e050920 8b450c             mov       eax,dword ptr [ebp+0c]
%1e050923 83780833           cmp       dword ptr [eax+08],+33 ;'3'
%1e050927 751e               jnz       %1e050947
%1e050929 833d1020641a00     cmp       dword ptr [1a642010],+00
%1e050930 0f85e5000000       jnz       %1e050a1b
%1e050936 8b00               mov       eax,dword ptr [eax]
%1e050938 a31020641a         mov       dword ptr [1a642010],eax
%1e05093d e8a00c0000         call      %1e0515e2
%1e050942 e9d4000000         jmp       %1e050a1b
%1e050947 83780835           cmp       dword ptr [eax+08],+35 ;'5'
%1e05094b 7522               jnz       %1e05096f
%1e05094d 8b00               mov       eax,dword ptr [eax]
%1e05094f 39051020641a       cmp       dword ptr [1a642010],eax
%1e050955 0f85c0000000       jnz       %1e050a1b
%1e05095b c7051020641a00000000 mov       dword ptr [1a642010],00000000
%1e050965 e8780c0000         call      %1e0515e2
%1e05096a e9ac000000         jmp       %1e050a1b
%1e05096f 8bd8               mov       ebx,eax
%1e050971 837b0855           cmp       dword ptr [ebx+08],+55 ;'U'
%1e050975 0f85a0000000       jnz       %1e050a1b
%1e05097b 833d1020641a00     cmp       dword ptr [1a642010],+00
%1e050982 0f856a000000       jnz       %1e0509f2
%1e050988 8b4b04             mov       ecx,dword ptr [ebx+04]
%1e05098b 85c9               test      ecx,ecx
%1e05098d 0f845f000000       jz        %1e0509f2
%1e050993 f60108             test      byte ptr [ecx],08
%1e050996 745a               jz        %1e0509f2
%1e050998 6a05               push      +05
%1e05099a 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e05099d 51                 push      ecx
%1e05099e e83d22c601         call      %1fcb2be0
%1e0509a3 83c408             add       esp,+08
%1e0509a6 3905c40f641a       cmp       dword ptr [1a640fc4],eax
%1e0509ac 7544               jnz       %1e0509f2
%1e0509ae 55                 push      ebp
%1e0509af 8d7dd0             lea       edi,[ebp-30]
%1e0509b2 57                 push      edi
%1e0509b3 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e0509b6 6a1e               push      +1e
%1e0509b8 51                 push      ecx
%1e0509b9 e842fac501         call      %1fcb0400
%1e0509be 83c410             add       esp,+10
%1e0509c1 8bd7               mov       edx,edi
%1e0509c3 85c0               test      eax,eax
%1e0509c5 742b               jz        %1e0509f2
%1e0509c7 bfc400061e         mov       edi,1e0600c4
%1e0509cc 33c0               xor       eax,eax
%1e0509ce 33c9               xor       ecx,ecx
%1e0509d0 8a02               mov       al,byte ptr [edx]
%1e0509d2 8a0f               mov       cl,byte ptr [edi]
%1e0509d4 42                 inc       edx
%1e0509d5 47                 inc       edi
%1e0509d6 84c9               test      cl,cl
%1e0509d8 7404               jz        %1e0509de
%1e0509da 3ac1               cmp       al,cl
%1e0509dc 74f2               jz        %1e0509d0
%1e0509de 2bc1               sub       eax,ecx
%1e0509e0 7510               jnz       %1e0509f2
%1e0509e2 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e0509e5 890d1020641a       mov       dword ptr [1a642010],ecx
%1e0509eb e8f20b0000         call      %1e0515e2
%1e0509f0 eb29               jmp       %1e050a1b
%1e0509f2 8b450c             mov       eax,dword ptr [ebp+0c]
%1e0509f5 8b1d1020641a       mov       ebx,dword ptr [1a642010]
%1e0509fb 3b580c             cmp       ebx,dword ptr [eax+0c]
%1e0509fe 751b               jnz       %1e050a1b
%1e050a00 8b4004             mov       eax,dword ptr [eax+04]
%1e050a03 85c0               test      eax,eax
%1e050a05 7414               jz        %1e050a1b
%1e050a07 f60010             test      byte ptr [eax],10
%1e050a0a 740f               jz        %1e050a1b
%1e050a0c c7051020641a00000000 mov       dword ptr [1a642010],00000000
%1e050a16 e8c70b0000         call      %1e0515e2
%1e050a1b 833dd400641a00     cmp       dword ptr [1a6400d4],+00
%1e050a22 0f84ca000000       jz        %1e050af2
%1e050a28 8b450c             mov       eax,dword ptr [ebp+0c]
%1e050a2b 83780805           cmp       dword ptr [eax+08],+05
%1e050a2f 7509               jnz       %1e050a3a
%1e050a31 668b4004           mov       ax,word ptr [eax+04]
%1e050a35 6685c0             test      ax,ax
%1e050a38 7519               jnz       %1e050a53
%1e050a3a 8b450c             mov       eax,dword ptr [ebp+0c]
%1e050a3d 83780855           cmp       dword ptr [eax+08],+55 ;'U'
%1e050a41 0f85ab000000       jnz       %1e050af2
%1e050a47 8b4004             mov       eax,dword ptr [eax+04]
%1e050a4a f60008             test      byte ptr [eax],08
%1e050a4d 0f849f000000       jz        %1e050af2
%1e050a53 8b5d0c             mov       ebx,dword ptr [ebp+0c]
%1e050a56 6aff               push      -01
%1e050a58 55                 push      ebp
%1e050a59 6a05               push      +05
%1e050a5b 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e050a5e 51                 push      ecx
%1e050a5f e87c21c601         call      %1fcb2be0
%1e050a64 83c40c             add       esp,+0c
%1e050a67 50                 push      eax
%1e050a68 e8ef73c601         call      %1fcb7e5c
%1e050a6d 83c408             add       esp,+08
%1e050a70 663d461f           cmp       ax,1f46
%1e050a74 0f8478000000       jz        %1e050af2
%1e050a7a 6a40               push      +40              ;'@'
%1e050a7c 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e050a7f 51                 push      ecx
%1e050a80 e8fbe9c501         call      %1fcaf480
%1e050a85 83c408             add       esp,+08
%1e050a88 85c0               test      eax,eax
%1e050a8a 7419               jz        %1e050aa5
%1e050a8c 6a00               push      +00
%1e050a8e 8b1d1000641a       mov       ebx,dword ptr [1a640010]
%1e050a94 50                 push      eax
%1e050a95 68a6110000         push      000011a6
%1e050a9a 53                 push      ebx
%1e050a9b e81856c601         call      %1fcb60b8
%1e050aa0 83c410             add       esp,+10
%1e050aa3 eb4d               jmp       %1e050af2
%1e050aa5 f605d800641a01     test      byte ptr [1a6400d8],01
%1e050aac 7444               jz        %1e050af2
%1e050aae 6a08               push      +08
%1e050ab0 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e050ab3 51                 push      ecx
%1e050ab4 e8a373c601         call      %1fcb7e5c
%1e050ab9 83c408             add       esp,+08
%1e050abc 66a90001           test      ax,0100
%1e050ac0 7430               jz        %1e050af2
%1e050ac2 6a05               push      +05
%1e050ac4 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e050ac7 51                 push      ecx
%1e050ac8 e81321c601         call      %1fcb2be0
%1e050acd 83c408             add       esp,+08
%1e050ad0 3905c40f641a       cmp       dword ptr [1a640fc4],eax
%1e050ad6 751a               jnz       %1e050af2
%1e050ad8 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e050adb 6a00               push      +00
%1e050add 51                 push      ecx
%1e050ade 8b0d1000641a       mov       ecx,dword ptr [1a640010]
%1e050ae4 68a6110000         push      000011a6
%1e050ae9 51                 push      ecx
%1e050aea e8c955c601         call      %1fcb60b8
%1e050aef 83c410             add       esp,+10
%1e050af2 f605e900641a20     test      byte ptr [1a6400e9],20 ;' '
%1e050af9 0f8461010000       jz        %1e050c60
%1e050aff 833da40f641a00     cmp       dword ptr [1a640fa4],+00
%1e050b06 0f8454010000       jz        %1e050c60
%1e050b0c 8b5d0c             mov       ebx,dword ptr [ebp+0c]
%1e050b0f 668b4b04           mov       cx,word ptr [ebx+04]
%1e050b13 6681f90780         cmp       cx,8007
%1e050b18 0f8542010000       jnz       %1e050c60
%1e050b1e 833b00             cmp       dword ptr [ebx],+00
%1e050b21 0f8439010000       jz        %1e050c60
%1e050b27 837b0833           cmp       dword ptr [ebx+08],+33 ;'3'
%1e050b2b 0f85e4000000       jnz       %1e050c15
%1e050b31 833d1420641a00     cmp       dword ptr [1a642014],+00
%1e050b38 0f85d7000000       jnz       %1e050c15
%1e050b3e 6a05               push      +05
%1e050b40 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e050b43 51                 push      ecx
%1e050b44 e89720c601         call      %1fcb2be0
%1e050b49 83c408             add       esp,+08
%1e050b4c 3905c40f641a       cmp       dword ptr [1a640fc4],eax
%1e050b52 0f85bd000000       jnz       %1e050c15
%1e050b58 33c9               xor       ecx,ecx
%1e050b5a 6a08               push      +08
%1e050b5c 66894df0           mov       word ptr [ebp-10],cx
%1e050b60 894df2             mov       dword ptr [ebp-0e],ecx
%1e050b63 894df6             mov       dword ptr [ebp-0a],ecx
%1e050b66 894dfa             mov       dword ptr [ebp-06],ecx
%1e050b69 66894dfe           mov       word ptr [ebp-02],cx
%1e050b6d 8b4b0c             mov       ecx,dword ptr [ebx+0c]
%1e050b70 51                 push      ecx
%1e050b71 e86a20c601         call      %1fcb2be0
%1e050b76 8b0b               mov       ecx,dword ptr [ebx]
%1e050b78 33d2               xor       edx,edx
%1e050b7a 890d1420641a       mov       dword ptr [1a642014],ecx
%1e050b80 52                 push      edx
%1e050b81 8d4df0             lea       ecx,[ebp-10]
%1e050b84 8bf8               mov       edi,eax
%1e050b86 51                 push      ecx
%1e050b87 8955f8             mov       dword ptr [ebp-08],edx
%1e050b8a 6880010000         push      00000180
%1e050b8f 8b0d1420641a       mov       ecx,dword ptr [1a642014]
%1e050b95 66c745f0ffff       mov       word ptr [ebp-10],ffff
%1e050b9b 66c745f20400       mov       word ptr [ebp-0e],0004
%1e050ba1 51                 push      ecx
%1e050ba2 8955fc             mov       dword ptr [ebp-04],edx
%1e050ba5 668955f4           mov       word ptr [ebp-0c],dx
%1e050ba9 66c745f6fe7f       mov       word ptr [ebp-0a],7ffe
%1e050baf e8f04fc601         call      %1fcb5ba4
%1e050bb4 83c418             add       esp,+18
%1e050bb7 8bc7               mov       eax,edi
%1e050bb9 66c745f24100       mov       word ptr [ebp-0e],0041

# u  G_HookData + c00  G_HookData + cee  ( looks like hookInputHook )

%1e050cb2 55                 push      ebp
%1e050cb3 33c0               xor       eax,eax
%1e050cb5 8bec               mov       ebp,esp
%1e050cb7 53                 push      ebx
%1e050cb8 57                 push      edi
%1e050cb9 56                 push      esi
%1e050cba 33f6               xor       esi,esi
%1e050cbc 83ec1c             sub       esp,+1c
%1e050cbf 39450c             cmp       dword ptr [ebp+0c],eax   ; if (pqmsg == NULL)
%1e050cc2 8945ec             mov       dword ptr [ebp-14],eax
%1e050cc5 7508               jnz       %1e050ccf

%1e050cc7 83c41c             add       esp,+1c
%1e050cca 5e                 pop       esi
%1e050ccb 5f                 pop       edi
%1e050ccc 5b                 pop       ebx
%1e050ccd 5d                 pop       ebp
%1e050cce c3                 retd

%1e050ccf 3905ac0f641a       cmp       dword ptr [1a640fac],eax ; if (!G_HookData.cSuppressWinlistNotify)
%1e050cd5 751a               jnz       %1e050cf1

%1e050cd7 8b450c             mov       eax,dword ptr [ebp+0c]
%1e050cda 8b480c             mov       ecx,dword ptr [eax+0c]
%1e050cdd 8b5004             mov       edx,dword ptr [eax+04]
%1e050ce0 51                 push      ecx
%1e050ce1 8b4808             mov       ecx,dword ptr [eax+08]
%1e050ce4 83ec0c             sub       esp,+0c
%1e050ce7 8b00               mov       eax,dword ptr [eax]
%1e050ce9 e8eff9ffff         call      %1e0506dd        ; G_HookData + 6dd, ProcessMsgsForWinlist
%1e050cee 83c410             add       esp,+10
#

hookInputHook stack frame

# dd db9ba0 -4

           fp       eip      hwnd     WM_SIZE
%00db9b9c  00db9bdc 1e050cee 800003cb 00000007
           scx      scy
%00db9bac  1fac0613 1dd2af80 1fcda7bb 00000004

# ln %1e050cee
%1e050000 XWPHOOK G_HookData + cee ( hookInputHook + ee )

# k db9b9c
005b:1e050cee 800003cb 00000007 1fac0613 1dd2af80 [XWPHOOK G_HookData + cee]
005b:1fcb2dac 00000001 1fcb2dc6 00000004 1d684a38 [PMMERGE CallInputHook + 174]

-- Might be SMP serialization defect

-- Might be GView::~GView defect
