PUP.Bat2Exe
Table of Contents
Analysis Report
General information
| Family Name: | PUP.Bat2Exe |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
a7730cfc63fcb81f76a0eb8cd1662b3e
SHA1:
384fd02aa11c4e334624a0de34efabbcce86d881
SHA256:
32780ADCDAC4CCBF385ED2A34F1E415BA94738CD47F952A99483CC37832F3D7E
File Size:
120.89 KB, 120892 bytes
|
|
MD5:
df0b9fcfdd4bb267c4bab54d13808bf2
SHA1:
d89a06d6428fd8e3d4b982166f1b556eaea3ed7b
SHA256:
08536B822FD0C0507380415A17531EE56B9B19D77099AFA38AC5C4033C13E975
File Size:
3.55 MB, 3553185 bytes
|
|
MD5:
ae055cb65ae3c489f4b5e85461b44542
SHA1:
7f24de09e4daaf4e9d4c54b215753eca55cedf0b
SHA256:
19AFBD271291610A763E6D729BC19B4C851DA8690FD83EC0E13C0C55269D5E23
File Size:
187.25 KB, 187251 bytes
|
|
MD5:
1233794ad08b4a59d4d9ab76f38b995a
SHA1:
bbf6d5d81daba69603256ef3a623bdce71a1dd7c
SHA256:
C975D20B9ABE18B7ADD9DD5EFBB333B235994E9FF7A0CBB31763FBFEA63A1767
File Size:
195.25 KB, 195250 bytes
|
|
MD5:
66929baa467e0d844bf6a86fbd962082
SHA1:
7d7c5612b518b95574feca62d0eaaf0602f51597
SHA256:
BD8BF3872F17E8FE997C7A736BE4F77564BB28CE041FA8B77321701172F0B6E6
File Size:
153.56 KB, 153559 bytes
|
Show More
|
MD5:
41027fa8c63f5c090c27c43957202707
SHA1:
38d30209282eb548fe7ebeec897bf301514781a3
SHA256:
310CF56004F155546F3BE7064B2335588B30AE97849B13046B444E09E48E2C5C
File Size:
1.73 MB, 1734169 bytes
|
|
MD5:
dc166b5267f93865146281acc15ec3a5
SHA1:
9740a883bb8e9b6cd1a3cfa6946118c459f41910
SHA256:
1A7CCE6B44D0648E3228B5837EC9BE588631EF4D298676FC154BF3AFFF55A124
File Size:
120.72 KB, 120718 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
Show More
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
|
| File Description | Created by BAT2EXE.net |
| File Version |
|
| Internal Name |
|
| Legal Copyright | Islam Adel |
| Original Filename |
|
| Product Name |
|
| Product Version |
|
File Traits
- 7-zip (In Overlay)
- 7-zip Installer
- big overlay
- HighEntropy
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 379 |
|---|---|
| Potentially Malicious Blocks: | 30 |
| Whitelisted Blocks: | 349 |
| Unknown Blocks: | 0 |
Visual Map
x
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
x
x
x
0
x
0
0
0
x
x
x
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
x
0
0
x
0
0
x
0
x
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
x
0
0
0
0
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
x
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
0
1
0
0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Zegost.AQ
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\babyftp\babyftp.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\babyftp\babyftp.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\babyftp\babyftp.lnk | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\babyftp\babyftp.lnk | Synchronize,Write Attributes |
| c:\users\user\appdata\local\babyftp\network.csv | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zs46aa.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zs46aa.tmp\pip_python.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zs46aa.tmp\pip_python.bat | Synchronize,Write Attributes |
Show More
| c:\users\user\appdata\local\temp\7zs621a.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zs621a.tmp\babyftp.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zs621a.tmp\babyftp.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zs621a.tmp\babyftp.lnk | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zs621a.tmp\babyftp.lnk | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zs621a.tmp\install.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zs621a.tmp\install.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsa785.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsa785.tmp\cpverify rm.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsa785.tmp\cpverify rm.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsa93b.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsa93b.tmp\capcomarcadestadium.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsa93b.tmp\capcomarcadestadium.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc1fd50c0 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc1fd50c0\autopushsimpeg.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc1fd50c0\autopushsimpeg.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\a?@02 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\a?@02 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\@838=0 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\@838=0 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\browsers.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\browsers.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\listreg.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\listreg.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\speedtest-cli.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\speedtest-cli.ini | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\speedtest.zip | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\prog\speedtest.zip | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\test_hd_windows23.cmd | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7zsc990cd73\test_hd_windows23.cmd | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 砰ࠃ㇘ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 깑緟ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 褧賖ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\mprapi::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\mprapi::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\mprapi::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\mprapi::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\mprapi::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\mprapi::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\mprapi::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKCU\software\pablo software solutions:: | RegNtPreCreateKey | |
| HKCU\software\pablo software solutions\babyftp:: | RegNtPreCreateKey | |
| HKCU\software\pablo software solutions\babyftp\settings:: | RegNtPreCreateKey | |
| HKCU\software\pablo software solutions\babyftp\settings::homedirectory | C:\Users\Qxyxqsgl\Desktop\skan | RegNtPreCreateKey |
| HKCU\software\pablo software solutions\babyftp\settings::allowcreatedir | RegNtPreCreateKey | |
| HKCU\software\pablo software solutions\babyftp\settings::allowdelete | RegNtPreCreateKey | |
| HKCU\software\pablo software solutions\babyftp\settings::allowdownload | RegNtPreCreateKey | |
| HKCU\software\pablo software solutions\babyftp\settings::allowrename | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ᾐ늎ǜ | RegNtPreCreateKey |
| HKCU\local settings\muicache\1b\52c64b7e::@c:\windows\system32\ndfapi.dll,-40001 | Windows Network Diagnostics | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Shell Execute |
|
| Syscall Use |
Show More
101 additional items are not displayed above. |
| Anti Debug |
|
| User Data Access |
|
| Process Terminate |
|
| Process Manipulation Evasion |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Icmp |
|
| Service Control |
|
| Encryption Used |
|
| Other Suspicious |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) PIP_PYTHON.bat
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
Show More
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install --upgrade pip
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install openpyxl
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install panda
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install secure-smtplib
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install datetime
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install imapclient
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install python-magic-bin
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install beautifulsoup4
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install requests
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install lxml
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install html2text
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install language_tool_python
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install pyperclip
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install Pillow
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install networkx
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install urllib3
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install geopy
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install ortools
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install qrcode[pil]
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install fillpdf
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
WriteConsole: python
|
WriteConsole: -m pip install
|
WriteConsole:
|
C:\Users\Xlnisgua\AppData\Local\Microsoft\WindowsApps\python.exe python -m pip install PyPDF2
|
WriteConsole: The system canno
|
WriteConsole:
|
WriteConsole: C:\Users\Xlnisgu
|
77 additional execution are not displayed above.