# -*- mode: python ; coding: utf-8 -*- block_cipher = None a = Analysis(['test.py', 'serial_plotter.py', 'read_arduino.py', 'ui.py'], pathex=['D:\\github\\Read-Sensor-Resistances'], binaries=[], datas=[], hiddenimports=[], hookspath=[], runtime_hooks=[], excludes=[], win_no_prefer_redirects=False, win_private_assemblies=False, cipher=block_cipher, noarchive=False) splash = Splash('splash.png', binaries=a.binaries, datas=a.datas, text_pos=(145, 142), text_size=8, text_color='black') pyz = PYZ(a.pure, a.zipped_data, cipher=block_cipher) exe = EXE(pyz, a.scripts, splash, # <-- both, splash target splash.binaries, # <-- and splash binaries a.binaries, a.zipfiles, a.datas, [], name='SeeDatResistance', debug=False, bootloader_ignore_signals=False, strip=False, upx=True, upx_exclude=[], runtime_tmpdir=None, console=False )