I am using Crypt::Blowfish and DBD::ODBC on win32/12.12.2/Strawberry When I use pp the .exe it creates when 2 zero byte files that correlate to the dll's that it should have included and that it is calling for that module. I have verified this by copying the original .dll files into the cache'd directory (over writing the strange names that get created) and the script will run correctly. I can force include a dll but since it doesn't have the correct name (when I include ODBC.dll it gets named ODBC.dll, but somewhere in the packing process it uses a different name (3d2b5e28.dll).
If this is not easily fixed is there a way to tell exactly where it is going to extra to? I see that -T can be passed to it to control part of the name, but I still wouldn't know exactly where it was going to. I figure I can just include the ODBC.dll and run a copy to copy it to 3d2b5328.dll before I run that module Travis