Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl: the Markov chain saw
 
PerlMonks  

Re^2: Strawberry Perl 64bit on Win7 crashes on DBI-function

by theman824 (Novice)
on Apr 22, 2014 at 12:18 UTC ( [id://1083159]=note: print w/replies, xml ) Need Help??


in reply to Re: Strawberry Perl 64bit on Win7 crashes on DBI-function
in thread Strawberry Perl 64bit on Win7 crashes on DBI-function

I saw that there is a standalone version available that doesn't require installation. I ran the suggested command.

The only other thing that happened was that the output "Out of memory!" was displayed (twice) right before the crash

Here's the interesting part (i guess), the whole thing is too long:
Started "PERL.EXE" (process 0x1A88) at address 0x0000000000400000. Su +ccessfully hooked module. Loaded "NTDLL.DLL" at address 0x0000000077220000. Successfully hooked + module. Loaded "KERNEL32.DLL" at address 0x0000000077000000. Successfully hoo +ked module. Loaded "KERNELBASE.DLL" at address 0x000007FEFD2E0000. Successfully h +ooked module. DllMain(0x000007FEFD2E0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "KERNELBASE.DLL" called. DllMain(0x000007FEFD2E0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "KERNELBASE.DLL" returned 1 (0x1). DllMain(0x0000000077000000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "KERNEL32.DLL" called. DllMain(0x0000000077000000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "KERNEL32.DLL" returned 1 (0x1). Injected "DEPENDS.DLL" at address 0x0000000066260000. Loaded "PERL518.DLL" at address 0x0000000063300000. Successfully hook +ed module. Loaded "ADVAPI32.DLL" at address 0x000007FEFDFB0000. Successfully hoo +ked module. Loaded "MSVCRT.DLL" at address 0x000007FEFDBC0000. Successfully hooke +d module. Loaded "SECHOST.DLL" at address 0x000007FEFDCB0000. Successfully hook +ed module. Loaded "RPCRT4.DLL" at address 0x000007FEFDA90000. Successfully hooke +d module. Loaded "COMCTL32.DLL" at address 0x000007FEFB7A0000. Successfully hoo +ked module. Loaded "GDI32.DLL" at address 0x000007FEFE090000. Successfully hooked + module. Loaded "USER32.DLL" at address 0x0000000077120000. Successfully hooke +d module. Loaded "LPK.DLL" at address 0x000007FEFE240000. Successfully hooked m +odule. Loaded "USP10.DLL" at address 0x000007FEFE100000. Successfully hooked + module. Loaded "SHLWAPI.DLL" at address 0x000007FEFE250000. Successfully hook +ed module. Loaded "WS2_32.DLL" at address 0x000007FEFDC60000. Successfully hooke +d module. Loaded "NSI.DLL" at address 0x000007FEFE1D0000. Successfully hooked m +odule. Loaded "LIBGCC_S_SJLJ-1.DLL" at address 0x000000006CEC0000. Successfu +lly hooked module. Loaded "LIBSTDC++-6.DLL" at address 0x000000006FC40000. Successfully +hooked module. Entrypoint reached. All implicit modules have been loaded. Loaded "APPHELP.DLL" at address 0x000007FEFCF70000. Successfully hook +ed module. DllMain(0x000007FEFCF70000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "APPHELP.DLL" called. DllMain(0x000007FEFCF70000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "APPHELP.DLL" returned 1 (0x1). Loaded "ACXTRNAL.DLL" at address 0x000007FEEF560000. Successfully hoo +ked module. DllMain(0x000007FEEF560000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "ACXTRNAL.DLL" called. DllMain(0x000007FEEF560000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "ACXTRNAL.DLL" returned 1 (0x1). FTH: (6792): *** Fault tolerant heap shim applied to current process. +This is usually due to previous crashes. *** DllMain(0x0000000066260000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "DEPENDS.DLL" called. DllMain(0x0000000066260000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "DEPENDS.DLL" returned 1 (0x1). DllMain(0x000007FEFDBC0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "MSVCRT.DLL" called. DllMain(0x000007FEFDBC0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "MSVCRT.DLL" returned 1 (0x1). DllMain(0x000007FEFDA90000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "RPCRT4.DLL" called. DllMain(0x000007FEFDA90000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "RPCRT4.DLL" returned 4255873025 (0xFDAB7801). DllMain(0x000007FEFDCB0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "SECHOST.DLL" called. DllMain(0x000007FEFDCB0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "SECHOST.DLL" returned 1 (0x1). DllMain(0x000007FEFDFB0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "ADVAPI32.DLL" called. DllMain(0x000007FEFDFB0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "ADVAPI32.DLL" returned 4261778945 (0xFE059601). DllMain(0x0000000077120000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "USER32.DLL" called. LoadLibraryW("C:\Windows\system32\IMM32.DLL") called from "USER32.DLL" + at address 0x000000007713B689. Loaded "IMM32.DLL" at address 0x000007FEFDCD0000. Successfully hooked + module. Loaded "MSCTF.DLL" at address 0x000007FEFD540000. Successfully hooked + module. DllMain(0x000007FEFD540000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "MSCTF.DLL" called. DllMain(0x000007FEFD540000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "MSCTF.DLL" returned 1 (0x1). DllMain(0x000007FEFDCD0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "IMM32.DLL" called. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmWINNLSEnableIME") c +alled from "USER32.DLL" at address 0x000000007713AA41 and returned 0x +000007FEFDCE5240. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmWINNLSGetEnableStat +us") called from "USER32.DLL" at address 0x000000007713AA6F and retur +ned 0x000007FEFDCE5280. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSendIMEMessageExW") + called from "USER32.DLL" at address 0x000000007713AA9D and returned +0x000007FEFDCE52D0. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSendIMEMessageExA") + called from "USER32.DLL" at address 0x000000007713AACB and returned +0x000007FEFDCE52E0. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmIMPGetIMEW") called + from "USER32.DLL" at address 0x000000007713AAF9 and returned 0x00000 +7FEFDCE53F0. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmIMPGetIMEA") called + from "USER32.DLL" at address 0x000000007713AB27 and returned 0x00000 +7FEFDCE5484. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmIMPQueryIMEW") call +ed from "USER32.DLL" at address 0x000000007713AB55 and returned 0x000 +007FEFDCE56C8. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmIMPQueryIMEA") call +ed from "USER32.DLL" at address 0x000000007713AB83 and returned 0x000 +007FEFDCE5828. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmIMPSetIMEW") called + from "USER32.DLL" at address 0x000000007713ABB1 and returned 0x00000 +7FEFDCE58E8. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmIMPSetIMEA") called + from "USER32.DLL" at address 0x000000007713ABDF and returned 0x00000 +7FEFDCE5A48. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmAssociateContext") +called from "USER32.DLL" at address 0x000000007713AC0D and returned 0 +x000007FEFDCD1750. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmEscapeA") called fr +om "USER32.DLL" at address 0x000000007713AC3B and returned 0x000007FE +FDCDD940. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmEscapeW") called fr +om "USER32.DLL" at address 0x000000007713AC69 and returned 0x000007FE +FDCDDC38. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetCompositionStrin +gA") called from "USER32.DLL" at address 0x000000007713AC97 and retur +ned 0x000007FEFDCD8B80. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetCompositionStrin +gW") called from "USER32.DLL" at address 0x000000007713ACC5 and retur +ned 0x000007FEFDCD8C60. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetCompositionWindo +w") called from "USER32.DLL" at address 0x000000007713ACF3 and return +ed 0x000007FEFDCD20C0. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetContext") called + from "USER32.DLL" at address 0x000000007713AD21 and returned 0x00000 +7FEFDCD1A0C. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetDefaultIMEWnd") +called from "USER32.DLL" at address 0x000000007713AD4F and returned 0 +x000007FEFDCD18E4. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmIsIME") called from + "USER32.DLL" at address 0x000000007713AD7D and returned 0x000007FEFD +CD2034. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmReleaseContext") ca +lled from "USER32.DLL" at address 0x000000007713ADAB and returned 0x0 +00007FEFDCD1A30. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmRegisterClient") ca +lled from "USER32.DLL" at address 0x000000007713ADD9 and returned 0x0 +00007FEFDCD1608. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetCompositionFontW +") called from "USER32.DLL" at address 0x000000007713AE07 and returne +d 0x000007FEFDCDA5C8. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetCompositionFontA +") called from "USER32.DLL" at address 0x000000007713AE35 and returne +d 0x000007FEFDCDA4F4. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetCompositionFontW +") called from "USER32.DLL" at address 0x000000007713AE63 and returne +d 0x000007FEFDCD3E80. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetCompositionFontA +") called from "USER32.DLL" at address 0x000000007713AE91 and returne +d 0x000007FEFDCDA690. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetCompositionWindo +w") called from "USER32.DLL" at address 0x000000007713AEBF and return +ed 0x000007FEFDCD3D14. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmNotifyIME") called +from "USER32.DLL" at address 0x000000007713AEED and returned 0x000007 +FEFDCD3F94. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmLockIMC") called fr +om "USER32.DLL" at address 0x000000007713AF1B and returned 0x000007FE +FDCD14D4. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmUnlockIMC") called +from "USER32.DLL" at address 0x000000007713AF49 and returned 0x000007 +FEFDCD1D8C. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmLoadIME") called fr +om "USER32.DLL" at address 0x000000007713AF77 and returned 0x000007FE +FDCD2360. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetOpenStatus") cal +led from "USER32.DLL" at address 0x000000007713AFA5 and returned 0x00 +0007FEFDCDA428. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmFreeLayout") called + from "USER32.DLL" at address 0x000000007713AFD3 and returned 0x00000 +7FEFDCDD0E8. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmActivateLayout") ca +lled from "USER32.DLL" at address 0x000000007713B001 and returned 0x0 +00007FEFDCDD2A0. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetCandidateWindow" +) called from "USER32.DLL" at address 0x000000007713B02F and returned + 0x000007FEFDCD2144. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetCandidateWindow" +) called from "USER32.DLL" at address 0x000000007713B05D and returned + 0x000007FEFDCDACFC. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmConfigureIMEW") cal +led from "USER32.DLL" at address 0x000000007713B08B and returned 0x00 +0007FEFDCDD6C0. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetConversionStatus +") called from "USER32.DLL" at address 0x000000007713B0B9 and returne +d 0x000007FEFDCD2D20. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetConversionStatus +") called from "USER32.DLL" at address 0x000000007713B0E7 and returne +d 0x000007FEFDCDA24C. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetStatusWindowPos" +) called from "USER32.DLL" at address 0x000000007713B115 and returned + 0x000007FEFDCDAC5C. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetImeInfoEx") call +ed from "USER32.DLL" at address 0x000000007713B143 and returned 0x000 +007FEFDCD22FC. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmLockImeDpi") called + from "USER32.DLL" at address 0x000000007713B171 and returned 0x00000 +7FEFDCD1A58. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmUnlockImeDpi") call +ed from "USER32.DLL" at address 0x000000007713B19F and returned 0x000 +007FEFDCD1AC8. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetOpenStatus") cal +led from "USER32.DLL" at address 0x000000007713B1CD and returned 0x00 +0007FEFDCDA3E4. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetActiveContext") +called from "USER32.DLL" at address 0x000000007713B1FB and returned 0 +x000007FEFDCD1B54. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmTranslateMessage") +called from "USER32.DLL" at address 0x000000007713B229 and returned 0 +x000007FEFDCE4D30. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmLoadLayout") called + from "USER32.DLL" at address 0x000000007713B257 and returned 0x00000 +7FEFDCD36C4. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmProcessKey") called + from "USER32.DLL" at address 0x000000007713B285 and returned 0x00000 +7FEFDCD39C8. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmPutImeMenuItemsInto +MappedFile") called from "USER32.DLL" at address 0x000000007713B2B3 a +nd returned 0x000007FEFDCEAF44. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmGetProperty") calle +d from "USER32.DLL" at address 0x000000007713B2E1 and returned 0x0000 +07FEFDCDE8F0. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetCompositionStrin +gA") called from "USER32.DLL" at address 0x000000007713B30F and retur +ned 0x000007FEFDCD8D40. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSetCompositionStrin +gW") called from "USER32.DLL" at address 0x000000007713B33D and retur +ned 0x000007FEFDCD8D70. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmEnumInputContext") +called from "USER32.DLL" at address 0x000000007713B36B and returned 0 +x000007FEFDCD3434. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "ImmSystemHandler") cal +led from "USER32.DLL" at address 0x000000007713B399 and returned 0x00 +0007FEFDCDFD88. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "CtfImmTIMActivate") ca +lled from "USER32.DLL" at address 0x000000007713B3C7 and returned 0x0 +00007FEFDCD21B8. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "CtfImmRestoreToolbarWn +d") called from "USER32.DLL" at address 0x000000007713B3F5 and return +ed 0x000007FEFDCEBB10. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "CtfImmHideToolbarWnd") + called from "USER32.DLL" at address 0x000000007713B423 and returned +0x000007FEFDCEBB50. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "CtfImmDispatchDefImeMe +ssage") called from "USER32.DLL" at address 0x000000007713B451 and re +turned 0x000007FEFDCD134C. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "CtfImmNotify") called +from "USER32.DLL" at address 0x000000007713B47B and returned 0x000007 +FEFDCD1170. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "CtfImmSetDefaultRemote +KeyboardLayout") called from "USER32.DLL" at address 0x000000007713B4 +A5 and returned 0x000007FEFDCEBF40. GetProcAddress(0x000007FEFDCD0000 [IMM32.DLL], "CtfImmGetCompatibleKey +boardLayout") called from "USER32.DLL" at address 0x000000007713B4CF +and returned 0x000007FEFDCEBF4C. DllMain(0x000007FEFDCD0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "IMM32.DLL" returned 1 (0x1). LoadLibraryW("C:\Windows\system32\IMM32.DLL") returned 0x000007FEFDCD0 +000. GetProcAddress(0x000007FEFE240000 [LPK.DLL], "LpkTabbedTextOut") calle +d from "GDI32.DLL" at address 0x000007FEFE09B615 and returned 0x00000 +7FEFE246AB0. GetProcAddress(0x000007FEFE240000 [LPK.DLL], "LpkPSMTextOut") called f +rom "GDI32.DLL" at address 0x000007FEFE09B62A and returned 0x000007FE +FE245300. GetProcAddress(0x000007FEFE240000 [LPK.DLL], "LpkDrawTextEx") called f +rom "GDI32.DLL" at address 0x000007FEFE09B63F and returned 0x000007FE +FE241460. GetProcAddress(0x000007FEFE240000 [LPK.DLL], "LpkEditControl") called +from "GDI32.DLL" at address 0x000007FEFE09B654 and returned 0x000007F +EFE24A050. DllMain(0x0000000077120000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "USER32.DLL" returned 1 (0x1). DllMain(0x000007FEFE100000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "USP10.DLL" called. LoadLibraryA("gdi32.dll") called from "USP10.DLL" at address 0x000007F +EFE11C9E6. LoadLibraryA("gdi32.dll") returned 0x000007FEFE090000. GetProcAddress(0x000007FEFE090000 [GDI32.DLL], "GetCharABCWidthsI") ca +lled from "USP10.DLL" at address 0x000007FEFE11CA2A and returned 0x00 +0007FEFE095974. DllMain(0x000007FEFE100000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "USP10.DLL" returned 1 (0x1). DllMain(0x000007FEFE240000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "LPK.DLL" called. DllMain(0x000007FEFE240000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "LPK.DLL" returned 1 (0x1). DllMain(0x000007FEFE090000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "GDI32.DLL" called. DllMain(0x000007FEFE090000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "GDI32.DLL" returned 1 (0x1). DllMain(0x000007FEFE250000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "SHLWAPI.DLL" called. DllMain(0x000007FEFE250000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "SHLWAPI.DLL" returned 1 (0x1). DllMain(0x000007FEFB7A0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "COMCTL32.DLL" called. GetProcAddress(0x000007FEFE240000 [LPK.DLL], "LpkEditControl") called +from "COMCTL32.DLL" at address 0x000007FEFB7C7CC2 and returned 0x0000 +07FEFE24A050. DllMain(0x000007FEFB7A0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "COMCTL32.DLL" returned 1 (0x1). DllMain(0x000007FEFE1D0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "NSI.DLL" called. DllMain(0x000007FEFE1D0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "NSI.DLL" returned 1 (0x1). DllMain(0x000007FEFDC60000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "WS2_32.DLL" called. DllMain(0x000007FEFDC60000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "WS2_32.DLL" returned 1 (0x1). DllMain(0x000000006CEC0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "LIBGCC_S_SJLJ-1.DLL" called. DllMain(0x000000006CEC0000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "LIBGCC_S_SJLJ-1.DLL" returned 1 (0x1). DllMain(0x000000006FC40000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "LIBSTDC++-6.DLL" called. DllMain(0x000000006FC40000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "LIBSTDC++-6.DLL" returned 1 (0x1). DllMain(0x0000000063300000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "PERL518.DLL" called. GetProcAddress(0x0000000077000000 [KERNEL32.DLL], "GetLongPathNameW") +called from "PERL518.DLL" at address 0x000000006341A3F5 and returned +0x000000007701C1A0. DllMain(0x0000000063300000, DLL_PROCESS_ATTACH, 0x000000000022FB00) in + "PERL518.DLL" returned 1 (0x1). Loaded "PGHOOK.DLL" at address 0x000007FEFD110000. Successfully hooke +d module. DllMain(0x000007FEFD110000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "PGHOOK.DLL" called. LoadLibraryA("ADVAPI32.dll") called from "PGHOOK.DLL" at address 0x000 +007FEFD11B188. LoadLibraryA("ADVAPI32.dll") returned 0x000007FEFDFB0000. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptAcquireContext +W") called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and return +ed 0x000007FEFDFBD98C. LoadLibraryExA("CRYPTSP.dll", 0x0000000000000000, 0x00000000) called f +rom "ADVAPI32.DLL" at address 0x000007FEFDFCB741. Loaded "CRYPTSP.DLL" at address 0x000007FEFD050000. Successfully hook +ed module. DllMain(0x000007FEFD050000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "CRYPTSP.DLL" called. DllMain(0x000007FEFD050000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "CRYPTSP.DLL" returned 1 (0x1). LoadLibraryExA("CRYPTSP.dll", 0x0000000000000000, 0x00000000) returned + 0x000007FEFD050000. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptAcquireContextW +") called from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and retur +ned 0x000007FEFD053308. Loaded "RSAENH.DLL" at address 0x000007FEFD000000. Successfully hooke +d module. DllMain(0x000007FEFD000000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "RSAENH.DLL" called. DllMain(0x000007FEFD000000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "RSAENH.DLL" returned 1 (0x1). LoadLibraryExA("ADVAPI32.dll", 0x0000000000000000, 0x00000000) called +from "RSAENH.DLL" at address 0x000007FEFD00319E. LoadLibraryExA("ADVAPI32.dll", 0x0000000000000000, 0x00000000) returne +d 0x000007FEFDFB0000. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "OpenThreadToken") c +alled from "RSAENH.DLL" at address 0x000007FEFD00314D and returned 0x +000007FEFDFCBD84. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "OpenProcessToken") +called from "RSAENH.DLL" at address 0x000007FEFD00314D and returned 0 +x000007FEFDFCBD70. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "GetTokenInformation +") called from "RSAENH.DLL" at address 0x000007FEFD00314D and returne +d 0x000007FEFDFCBD50. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "AllocateAndInitiali +zeSid") called from "RSAENH.DLL" at address 0x000007FEFD00314D and re +turned 0x000007FEFDFCB63C. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "EqualSid") called f +rom "RSAENH.DLL" at address 0x000007FEFD00314D and returned 0x000007F +EFDFCB820. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "FreeSid") called fr +om "RSAENH.DLL" at address 0x000007FEFD00314D and returned 0x000007FE +FDFCB818. LoadLibraryExA("CRYPTBASE.dll", 0x0000000000000000, 0x00000000) called + from "RSAENH.DLL" at address 0x000007FEFD00319E. Loaded "CRYPTBASE.DLL" at address 0x000007FEFCFF0000. Successfully ho +oked module. DllMain(0x000007FEFCFF0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "CRYPTBASE.DLL" called. DllMain(0x000007FEFCFF0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "CRYPTBASE.DLL" returned 1 (0x1). LoadLibraryExA("CRYPTBASE.dll", 0x0000000000000000, 0x00000000) return +ed 0x000007FEFCFF0000. GetProcAddress(0x000007FEFCFF0000 [CRYPTBASE.DLL], "SystemFunction036" +) called from "RSAENH.DLL" at address 0x000007FEFD00314D and returned + 0x000007FEFCFF1648. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwOpenKey") called fro +m "PGHOOK.DLL" at address 0x000007FEFD139980 and returned 0x000000007 +72713D0. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwQueryValueKey") call +ed from "PGHOOK.DLL" at address 0x000007FEFD139999 and returned 0x000 +0000077271420. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwClose") called from +"PGHOOK.DLL" at address 0x000007FEFD1399B2 and returned 0x00000000772 +713A0. LoadLibraryA("PSAPI.DLL") called from "PGHOOK.DLL" at address 0x000007 +FEFD11B188. Loaded "PSAPI.DLL" at address 0x00000000773E0000. Successfully hooked + module. DllMain(0x00000000773E0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "PSAPI.DLL" called. DllMain(0x00000000773E0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "PSAPI.DLL" returned 1 (0x1). LoadLibraryA("PSAPI.DLL") returned 0x00000000773E0000. GetProcAddress(0x00000000773E0000 [PSAPI.DLL], "GetModuleBaseNameW") c +alled from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x +00000000773E11C4. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwOpenKey") called fro +m "PGHOOK.DLL" at address 0x000007FEFD1334C0 and returned 0x000000007 +72713D0. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwQueryValueKey") call +ed from "PGHOOK.DLL" at address 0x000007FEFD1334D9 and returned 0x000 +0000077271420. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwClose") called from +"PGHOOK.DLL" at address 0x000007FEFD1334F2 and returned 0x00000000772 +713A0. GetProcAddress(0x000007FEFD2E0000 [KERNELBASE.DLL], "CreateProcessInte +rnalW") called from "PGHOOK.DLL" at address 0x000007FEFD136B8F and re +turned NULL. Error: Die angegebene Prozedur wurde nicht gefunden (127 +). GetProcAddress(0x000007FEFD2E0000 [KERNELBASE.DLL], "CreateProcessAsUs +erW") called from "PGHOOK.DLL" at address 0x000007FEFD136BB2 and retu +rned NULL. Error: Die angegebene Prozedur wurde nicht gefunden (127). GetProcAddress(0x000007FEFD2E0000 [KERNELBASE.DLL], "OpenProcess") cal +led from "PGHOOK.DLL" at address 0x000007FEFD136BD5 and returned 0x00 +0007FEFD2F32C0. GetProcAddress(0x0000000077000000 [KERNEL32.DLL], "CreateProcessIntern +alW") called from "PGHOOK.DLL" at address 0x000007FEFD1171D7 and retu +rned 0x000000007701E750. GetProcAddress(0x0000000077000000 [KERNEL32.DLL], "CreateProcessAsUser +W") called from "PGHOOK.DLL" at address 0x000007FEFD136D35 and return +ed 0x000000007700A420. GetProcAddress(0x000007FEFD2E0000 [KERNELBASE.DLL], "LoadLibraryExW") +called from "PGHOOK.DLL" at address 0x000007FEFD138876 and returned 0 +x000007FEFD2E8EF0. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "OpenSCManagerW") cal +led from "PGHOOK.DLL" at address 0x000007FEFD132D2D and returned 0x00 +0007FEFDCB659C. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "OpenServiceW") calle +d from "PGHOOK.DLL" at address 0x000007FEFD132D6D and returned 0x0000 +07FEFDCB6484. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "StartServiceW") call +ed from "PGHOOK.DLL" at address 0x000007FEFD132DAD and returned 0x000 +007FEFDCB6824. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "CloseServiceHandle") + called from "PGHOOK.DLL" at address 0x000007FEFD132DED and returned +0x000007FEFDCB6518. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ControlServiceExW") +called from "PGHOOK.DLL" at address 0x000007FEFD132E2D and returned 0 +x000007FEFDCB8C38. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ChangeServiceConfigW +") called from "PGHOOK.DLL" at address 0x000007FEFD132E8B and returne +d 0x000007FEFDCB7220. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ChangeServiceConfig2 +W") called from "PGHOOK.DLL" at address 0x000007FEFD132ECB and return +ed 0x000007FEFDCB7538. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "OpenSCManagerA") cal +led from "PGHOOK.DLL" at address 0x000007FEFD132F29 and returned 0x00 +0007FEFDCB6AA4. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "OpenServiceA") calle +d from "PGHOOK.DLL" at address 0x000007FEFD132F69 and returned 0x0000 +07FEFDCB6C34. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "StartServiceA") call +ed from "PGHOOK.DLL" at address 0x000007FEFD132FA9 and returned 0x000 +007FEFDCB6D00. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ControlService") cal +led from "PGHOOK.DLL" at address 0x000007FEFD132FE9 and returned 0x00 +0007FEFDCB642C. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ChangeServiceConfigA +") called from "PGHOOK.DLL" at address 0x000007FEFD133029 and returne +d 0x000007FEFDCB6F2C. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ChangeServiceConfig2 +A") called from "PGHOOK.DLL" at address 0x000007FEFD133069 and return +ed 0x000007FEFDCB739C. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ControlServiceExA") +called from "PGHOOK.DLL" at address 0x000007FEFD1330A9 and returned 0 +x000007FEFDCB8B00. DllMain(0x000007FEFD110000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "PGHOOK.DLL" returned 1 (0x1). GetProcAddress(0x0000000077220000 [NTDLL.DLL], "NtCompareTokens") call +ed from "PGHOOK.DLL" at address 0x000007FEFD1383C4 and returned 0x000 +0000077271BA0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "ConvertStringSidToS +idW") called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and retu +rned 0x000007FEFDFD0EC0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "IsValidSid") called + from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x00000 +7FEFDFC1730. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "GetLengthSid") call +ed from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x000 +007FEFDFCB580. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CopySid") called fr +om "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x000007FE +FDFCBDA0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "OpenProcessToken") +called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0 +x000007FEFDFCBD70. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "GetTokenInformation +") called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returne +d 0x000007FEFDFCBD50. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "EqualSid") called f +rom "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x000007F +EFDFCB820. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "DuplicateToken") ca +lled from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x0 +00007FEFDFBD358. GetProcAddress(0x000007FEFDBC0000 [MSVCRT.DLL], "_set_invalid_paramete +r_handler") called from "PERL.EXE" at address 0x0000000000401292 and +returned NULL. Error: Die angegebene Prozedur wurde nicht gefunden (1 +27). GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CreateRestrictedTok +en") called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and retur +ned 0x000007FEFDFEB784. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "NtSetInformationFile") + called from "PGHOOK.DLL" at address 0x000007FEFD1171D7 and returned +0x0000000077271520. GetProcAddress(0x0000000063300000 [PERL518.DLL], "init_Win32CORE") cal +led from "PERL518.DLL" at address 0x000000006341ACDA and returned 0x0 +00000006341E7D0. LoadLibraryExA("c:\strawberry\perl\site\lib\auto\DBI\DBI.dll", 0x00000 +00000000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "PERL518.DLL" + at address 0x000000006341AC54. Loaded "DBI.DLL" at address 0x0000000069940000. Successfully hooked m +odule. DllMain(0x0000000069940000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "DBI.DLL" called. DllMain(0x0000000069940000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "DBI.DLL" returned 1 (0x1). LoadLibraryExA("c:\strawberry\perl\site\lib\auto\DBI\DBI.dll", 0x00000 +00000000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x00000000699400 +00. GetProcAddress(0x0000000069940000 [DBI.DLL], "boot_DBI") called from " +PERL518.DLL" at address 0x000000006341E08B and returned 0x00000000699 +557F0. LoadLibraryExA("c:\strawberry\perl\lib\auto\List\Util\Util.dll", 0x000 +0000000000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "PERL518.DL +L" at address 0x000000006341AC54. Loaded "UTIL.DLL" at address 0x0000000062D80000. Successfully hooked +module. DllMain(0x0000000062D80000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "UTIL.DLL" called. DllMain(0x0000000062D80000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "UTIL.DLL" returned 1 (0x1). LoadLibraryExA("c:\strawberry\perl\lib\auto\List\Util\Util.dll", 0x000 +0000000000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x0000000062D8 +0000. GetProcAddress(0x0000000062D80000 [UTIL.DLL], "boot_List__Util") calle +d from "PERL518.DLL" at address 0x000000006341E08B and returned 0x000 +0000062D860C0. LoadLibraryExA("c:\strawberry\perl\site\lib\auto\DBD\ODBC\ODBC.dll", 0 +x0000000000000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "PERL51 +8.DLL" at address 0x000000006341AC54. Loaded "ODBC.DLL" at address 0x0000000061F00000. Successfully hooked +module. Loaded "ODBC32.DLL" at address 0x000007FEF0810000. Successfully hooke +d module. DllMain(0x000007FEF0810000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "ODBC32.DLL" called. GetProcAddress(0x0000000077000000 [KERNEL32.DLL], "TryEnterCriticalSec +tion") called from "ODBC32.DLL" at address 0x000007FEF0819E6F and ret +urned 0x0000000077245350. GetProcAddress(0x0000000077000000 [KERNEL32.DLL], "SetCriticalSectionS +pinCount") called from "ODBC32.DLL" at address 0x000007FEF0819E86 and + returned 0x0000000077247760. LoadLibraryExA("C:\Windows\system32\odbcint.dll", 0x0000000000000000, +LOAD_WITH_ALTERED_SEARCH_PATH) called from "ODBC32.DLL" at address 0x +000007FEF0819410. Loaded "ODBCINT.DLL" at address 0x0000000059AF0000. Successfully hook +ed module. LoadLibraryExA("C:\Windows\system32\odbcint.dll", 0x0000000000000000, +LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x0000000059AF0000. DllMain(0x000007FEF0810000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "ODBC32.DLL" returned 1 (0x1). DllMain(0x0000000061F00000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "ODBC.DLL" called. DllMain(0x0000000061F00000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "ODBC.DLL" returned 1 (0x1). LoadLibraryExA("c:\strawberry\perl\site\lib\auto\DBD\ODBC\ODBC.dll", 0 +x0000000000000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x00000000 +61F00000. GetProcAddress(0x0000000061F00000 [ODBC.DLL], "boot_DBD__ODBC") called + from "PERL518.DLL" at address 0x000000006341E08B and returned 0x0000 +000061F08730. LoadLibraryExA("c:\strawberry\perl\lib\auto\Sys\Hostname\Hostname.dll" +, 0x0000000000000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "PER +L518.DLL" at address 0x000000006341AC54. Loaded "HOSTNAME.DLL" at address 0x0000000064400000. Successfully hoo +ked module. DllMain(0x0000000064400000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "HOSTNAME.DLL" called. DllMain(0x0000000064400000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "HOSTNAME.DLL" returned 1 (0x1). LoadLibraryExA("c:\strawberry\perl\lib\auto\Sys\Hostname\Hostname.dll" +, 0x0000000000000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x00000 +00064400000. GetProcAddress(0x0000000064400000 [HOSTNAME.DLL], "boot_Sys__Hostname" +) called from "PERL518.DLL" at address 0x000000006341E08B and returne +d 0x0000000064401580. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptCreateHash") c +alled from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x +000007FEFDFBDAD4. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptCreateHash") ca +lled from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned 0 +x000007FEFD055354. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptHashData") cal +led from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x00 +0007FEFDFBDAC0. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptHashData") call +ed from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned 0x0 +00007FEFD0556F0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptDeriveKey") ca +lled from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x0 +00007FEFDFEB6B0. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptDeriveKey") cal +led from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned 0x +000007FEFD0545F0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptDestroyHash") +called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0 +x000007FEFDFBDB00. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptDestroyHash") c +alled from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned +0x000007FEFD055928. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptEncrypt") call +ed from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x000 +007FEFDFEB650. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptEncrypt") calle +d from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned 0x00 +0007FEFD0550A0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptDestroyKey") c +alled from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x +000007FEFDFBAFA0. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptDestroyKey") ca +lled from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned 0 +x000007FEFD054838. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "CryptDecrypt") call +ed from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x000 +007FEFDFEB6D0. GetProcAddress(0x000007FEFD050000 [CRYPTSP.DLL], "CryptDecrypt") calle +d from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned 0x00 +0007FEFD055200. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwQueryInformationProc +ess") called from "PGHOOK.DLL" at address 0x000007FEFD12A85C and retu +rned 0x0000000077271440. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "NtOpenSymbolicLinkObje +ct") called from "PGHOOK.DLL" at address 0x000007FEFD12A880 and retur +ned 0x00000000772722B0. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwQuerySymbolicLinkObj +ect") called from "PGHOOK.DLL" at address 0x000007FEFD12A8A4 and retu +rned 0x0000000077272570. GetProcAddress(0x0000000077220000 [NTDLL.DLL], "ZwClose") called from +"PGHOOK.DLL" at address 0x000007FEFD12A8C8 and returned 0x00000000772 +713A0. LoadLibraryW("psapi.dll") called from "PGHOOK.DLL" at address 0x000007 +FEFD12A8DC. LoadLibraryW("psapi.dll") returned 0x00000000773E0000. GetProcAddress(0x00000000773E0000 [PSAPI.DLL], "GetProcessImageFileNam +eW") called from "PGHOOK.DLL" at address 0x000007FEFD12A902 and retur +ned 0x00000000773E1310. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "RegOpenKeyExW") cal +led from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x00 +0007FEFDFD06F0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "RegQueryValueExW") +called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0 +x000007FEFDFCC2D0. GetProcAddress(0x000007FEFDFB0000 [ADVAPI32.DLL], "RegCloseKey") calle +d from "PGHOOK.DLL" at address 0x000007FEFD11B285 and returned 0x0000 +07FEFDFD0710. LoadLibraryW("psapi.dll") called from "PGHOOK.DLL" at address 0x000007 +FEFD133AC1. LoadLibraryW("psapi.dll") returned 0x00000000773E0000. GetProcAddress(0x00000000773E0000 [PSAPI.DLL], "GetProcessImageFileNam +eW") called from "PGHOOK.DLL" at address 0x000007FEFD133AE7 and retur +ned 0x00000000773E1310. GetProcAddress(0x00000000773E0000 [PSAPI.DLL], "GetProcessImageFileNam +eW") called from "PGHOOK.DLL" at address 0x000007FEFD11B285 and retur +ned 0x00000000773E1310. GetProcAddress(0x0000000077000000 [KERNEL32.DLL], "IsWow64Process") ca +lled from "PGHOOK.DLL" at address 0x000007FEFD129F03 and returned 0x0 +0000000770091D0. LoadLibraryExA("SspiCli.dll", 0x0000000000000000, 0x00000000) called f +rom "ADVAPI32.DLL" at address 0x000007FEFDFCB741. Loaded "SSPICLI.DLL" at address 0x000007FEFCF40000. Successfully hook +ed module. DllMain(0x000007FEFCF40000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "SSPICLI.DLL" called. DllMain(0x000007FEFCF40000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "SSPICLI.DLL" returned 1 (0x1). LoadLibraryExA("SspiCli.dll", 0x0000000000000000, 0x00000000) returned + 0x000007FEFCF40000. GetProcAddress(0x000007FEFCF40000 [SSPICLI.DLL], "GetUserNameExA") cal +led from "ADVAPI32.DLL" at address 0x000007FEFDFCB7AD and returned 0x +000007FEFCF41640. Loaded "NLAAPI.DLL" at address 0x000007FEFAD40000. Successfully hooke +d module. DllMain(0x000007FEFAD40000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "NLAAPI.DLL" called. DllMain(0x000007FEFAD40000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "NLAAPI.DLL" returned 1 (0x1). Loaded "NAPINSP.DLL" at address 0x000007FEF8EF0000. Successfully hook +ed module. DllMain(0x000007FEF8EF0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "NAPINSP.DLL" called. DllMain(0x000007FEF8EF0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "NAPINSP.DLL" returned 1 (0x1). LoadLibraryExA("API-MS-Win-Security-SDDL-L1-1-0.dll", 0x00000000000000 +00, 0x00000000) called from "NAPINSP.DLL" at address 0x000007FEF8EF19 +A6. LoadLibraryExA("API-MS-Win-Security-SDDL-L1-1-0.dll", 0x00000000000000 +00, 0x00000000) returned 0x000007FEFDCB0000. GetProcAddress(0x000007FEFDCB0000 [SECHOST.DLL], "ConvertStringSecurit +yDescriptorToSecurityDescriptorW") called from "NAPINSP.DLL" at addre +ss 0x000007FEF8EF1A12 and returned 0x000007FEFDCBD4C4. Loaded "PNRPNSP.DLL" at address 0x000007FEF8ED0000. Successfully hook +ed module. DllMain(0x000007FEF8ED0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "PNRPNSP.DLL" called. DllMain(0x000007FEF8ED0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "PNRPNSP.DLL" returned 1 (0x1). Loaded "MSWSOCK.DLL" at address 0x000007FEFC930000. Successfully hook +ed module. DllMain(0x000007FEFC930000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "MSWSOCK.DLL" called. DllMain(0x000007FEFC930000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "MSWSOCK.DLL" returned 1 (0x1). Loaded "DNSAPI.DLL" at address 0x000007FEFC7B0000. Successfully hooke +d module. DllMain(0x000007FEFC7B0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "DNSAPI.DLL" called. DllMain(0x000007FEFC7B0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "DNSAPI.DLL" returned 1 (0x1). Loaded "WINRNR.DLL" at address 0x000007FEF8EC0000. Successfully hooke +d module. DllMain(0x000007FEF8EC0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "WINRNR.DLL" called. DllMain(0x000007FEF8EC0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "WINRNR.DLL" returned 1 (0x1). LoadLibraryExA("WS2_32.dll", 0x0000000000000000, 0x00000000) called fr +om "NAPINSP.DLL" at address 0x000007FEF8EF19A6. LoadLibraryExA("WS2_32.dll", 0x0000000000000000, 0x00000000) returned +0x000007FEFDC60000. GetProcAddress(0x000007FEFDC60000 [WS2_32.DLL], 0x0000000000000070) ca +lled from "NAPINSP.DLL" at address 0x000007FEF8EF1A12 and returned 0x +000007FEFDC6D510. GetProcAddress(0x000007FEFDC60000 [WS2_32.DLL], 0x000000000000006F) ca +lled from "NAPINSP.DLL" at address 0x000007FEF8EF1A12 and returned 0x +000007FEFDC61290. LoadLibraryExA("bcrypt.dll", 0x0000000000000000, 0x00000000) called fr +om "ODBC32.DLL" at address 0x000007FEF081C93E. Loaded "BCRYPT.DLL" at address 0x000007FEFCAC0000. Successfully hooke +d module. DllMain(0x000007FEFCAC0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "BCRYPT.DLL" called. DllMain(0x000007FEFCAC0000, DLL_PROCESS_ATTACH, 0x0000000000000000) in + "BCRYPT.DLL" returned 1 (0x1). LoadLibraryExA("bcrypt.dll", 0x0000000000000000, 0x00000000) returned +0x000007FEFCAC0000. GetProcAddress(0x000007FEFCAC0000 [BCRYPT.DLL], "BCryptCloseAlgorithmP +rovider") called from "ODBC32.DLL" at address 0x000007FEF081C8ED and +returned 0x000007FEFCAC32B0. HEAP[PERL.EXE]: Heap block at 0000000002682720 modified at 00000000026 +83050 past requested size of 920 HEAP[PERL.EXE]: Invalid address specified to RtlValidateHeap( 00000000 +005E0000, 0000000002682730 ) HEAP[PERL.EXE]: Heap block at 0000000002682720 modified at 00000000026 +83050 past requested size of 920 HEAP[PERL.EXE]: Invalid address specified to RtlReAllocateHeap( 000000 +00005E0000, 0000000002682730 ) HEAP[PERL.EXE]: Heap block at 0000000002682720 modified at 00000000026 +83050 past requested size of 920 HEAP[PERL.EXE]: Invalid address specified to RtlValidateHeap( 00000000 +005E0000, 0000000002682730 ) HEAP[PERL.EXE]: Heap block at 0000000002682720 modified at 00000000026 +83050 past requested size of 920 HEAP[PERL.EXE]: Invalid address specified to RtlReAllocateHeap( 000000 +00005E0000, 0000000002682730 ) Second chance exception 0xC0000374 (Unknown) occurred in "ACXTRNAL.DLL +" at address 0x000007FEEF565B07. Exited "PERL.EXE" (process 0x1A88) with code -1073740940 (0xC0000374).

Replies are listed 'Best First'.
Re^3: Strawberry Perl 64bit on Win7 crashes on DBI-function
by theman824 (Novice) on Apr 22, 2014 at 13:31 UTC

    Hm. Looks like "ACXTRNAL.DLL" is causing a problem.

    There's two of those on Win 7 64 bit:

    C:\Windows\AppPatch\AppPatch64\AcXtrnal.dll

    and

    C:\Windows\AppPatch\AcXtrnal.dll .

    In the depends-log it says:
    ***************************| Module Dependency Tree |***************** +********** * + * * Legend: F Forwarded Module ? Missing Module 6 64-bit Mod +ule * * D Delay Load Module ! Invalid Module + * * * Dynamic Module E Import/Export Mismatch or Load Fail +ure * * ^ Duplicate Module + * * + * ********************************************************************** +********** ... [* 6] c:\windows\apppatch\apppatch64\ACXTRNAL.DLL [ ^6] c:\windows\system32\NTDLL.DLL [ ^6] c:\windows\system32\KERNEL32.DLL ...
    And then there's this line:
    [* 6] c:\windows\apppatch\apppatch64\ACXTRNAL.DLL + 04.03. +2011 08:19 04.03.2011 08:06 135.168 A 0x00024032 0x000 +24032 x64 Console CV 0x000007FF64000000 0x000007FEEF56 +0000 0x00467000 21 6.1.7601.17571 6.1.7601.17571 + 6.1 9.0 6.1 6.1
    I don't know what i'm looking at ...
      :) Well, pretty much all this is saying is "start debugger next ... probably not perl problem"
      The problem is earlier in the process with the Heap corruption warnings.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://1083159]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others cooling their heels in the Monastery: (6)
As of 2024-04-16 07:04 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found