Jump to content
Ultimaker Community of 3D Printing Experts

Cura 2.6.2 - Why the software tries to open a series of scripts (firebird.BAT, firebird.WSH etc.)?

Recommended Posts

Hello everybody,

we check every software before we use it in our company. During that test, we noticed that the Cura 2.6.2 software tries to open a series of scripts (specifically in IBM-, Lenovo- and Microsoft-folders):


What is the purpose of this and how can I disable this?

Best regards,


Share this post

Link to post
Share on other sites

// sorry for the late response

It is the installed application.

As setup we used the installer from the website (Cura 2.6.2 x64): https://ultimaker.com/en/products/cura-software

In Cura we deactivated all (optional) plugins, to limited the reasons for the behavior. For testing the software we use (among others) "ProcessActivityView v1.16 x64": http://www.nirsoft.net/utils/process_activity_view.html


test system

Windows 7 Prof. x64 (completely patched)

affected folders

  • C:\Program Files (x86)\Common Files\Lenovo
  • C:\Program Files (x86)\IBM\Client Access\Emulator
  • C:\Program Files (x86)\IBM\Lotus\Notes
  • C:\Program Files (x86)\IBM\Notes
  • C:\Program Files (x86)\Microsoft SQL Server
  • C:\Program Files (x86)\ShowCase Suite

scripts (+ ext) that are trying to open

  • firebird.BAT .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • firefox.BAT .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • mozilla.BAT .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • netscape .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • opera .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • seamonkey .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH

Share this post

Link to post
Share on other sites

Apart from the fact that webbrowser is a standard library of python3, so no-one seems to have an alternative to it.

Sure, QDesktopServices.openUrl(). It is used all over the place in Cura.

I could move the importing of the module to when it's actually called, so that should atleast limit the issue somewhat.

Yes, that would mean that disabling the plugin would prevent this browser storm from happening.

Note that on my system (and I wouldn't think my system is all that special), it tries to access a couple of hundred different files, most of which are filetypes very commonly associated with malware (scripts, which are commonly used to highjack common executables).

Share this post

Link to post
Share on other sites

*Mumbles something about stupid python libraries*

I'll go have a look at this. It might actually fix the virus scanners triggering on Cura. Still can't believe that a default python lib does stupid stuff like this.

Anyways. It should be fixed now.

Edited by Guest

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Our picks

    • How to 3D print with reinforced engineering materials
      Ultimaker is hosting a webinar where we explain how you can achieve and maintain a high print success rate using these new reinforced engineering materials. Learn from Ultimaker's Product Manager of Materials and top chemical engineer Bart van As how you can take your 3D printing to that next level.
      • 1 reply
    • "Back To The Future" using Generative Design & Investment Casting
      Designing for light-weight parts is becoming more important, and I’m a firm believer in the need to produce lighter weight, less over-engineered parts for the future. This is for sustainability reasons because we need to be using less raw materials and, in things like transportation, it impacts the energy usage of the product during it’s service life.
        • Like
      • 12 replies

Important Information

Welcome to the Ultimaker Community of 3D printing experts. Visit the following links to read more about our Terms of Use or our Privacy Policy. Thank you!