# -*- mode: python ; coding: utf-8 -*- block_cipher = None a = Analysis(['xscanserver.py'], pathex=['D:\\docxdemo'], binaries=[], datas=[], hiddenimports=['email.mime.message', 'email.mime.image', 'email.mime.text', 'email.mime.multipart', 'email.mime.audio', 'email.mime.base', 'email.mime.application', 'email.mime.nonmultipart'], hookspath=[], runtime_hooks=[], excludes=[], win_no_prefer_redirects=False, win_private_assemblies=False, cipher=block_cipher, noarchive=False) pyz = PYZ(a.pure, a.zipped_data, cipher=block_cipher) exe = EXE(pyz, a.scripts, [], exclude_binaries=True, name='xscanserver', debug=False, bootloader_ignore_signals=False, strip=False, upx=True, console=True , icon='icon.ico') coll = COLLECT(exe, a.binaries, a.zipfiles, a.datas, strip=False, upx=True, upx_exclude=[], name='xscanserver')