Jump to content
Ultimaker Community of 3D Printing Experts

Cura 2.6.2 - Why the software tries to open a series of scripts (firebird.BAT, firebird.WSH etc.)?

Recommended Posts

Hello everybody,

we check every software before we use it in our company. During that test, we noticed that the Cura 2.6.2 software tries to open a series of scripts (specifically in IBM-, Lenovo- and Microsoft-folders):


What is the purpose of this and how can I disable this?

Best regards,


Share this post

Link to post
Share on other sites

// sorry for the late response

It is the installed application.

As setup we used the installer from the website (Cura 2.6.2 x64): https://ultimaker.com/en/products/cura-software

In Cura we deactivated all (optional) plugins, to limited the reasons for the behavior. For testing the software we use (among others) "ProcessActivityView v1.16 x64": http://www.nirsoft.net/utils/process_activity_view.html


test system

Windows 7 Prof. x64 (completely patched)

affected folders

  • C:\Program Files (x86)\Common Files\Lenovo
  • C:\Program Files (x86)\IBM\Client Access\Emulator
  • C:\Program Files (x86)\IBM\Lotus\Notes
  • C:\Program Files (x86)\IBM\Notes
  • C:\Program Files (x86)\Microsoft SQL Server
  • C:\Program Files (x86)\ShowCase Suite

scripts (+ ext) that are trying to open

  • firebird.BAT .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • firefox.BAT .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • mozilla.BAT .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • netscape .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • opera .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH
  • seamonkey .CMD .COM .EXE .JS .JSE .MSC .VBE .VBS .WSF .WSH

Share this post

Link to post
Share on other sites

Apart from the fact that webbrowser is a standard library of python3, so no-one seems to have an alternative to it.

Sure, QDesktopServices.openUrl(). It is used all over the place in Cura.

I could move the importing of the module to when it's actually called, so that should atleast limit the issue somewhat.

Yes, that would mean that disabling the plugin would prevent this browser storm from happening.

Note that on my system (and I wouldn't think my system is all that special), it tries to access a couple of hundred different files, most of which are filetypes very commonly associated with malware (scripts, which are commonly used to highjack common executables).

Share this post

Link to post
Share on other sites

*Mumbles something about stupid python libraries*

I'll go have a look at this. It might actually fix the virus scanners triggering on Cura. Still can't believe that a default python lib does stupid stuff like this.

Anyways. It should be fixed now.

Edited by Guest

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


Important Information

Welcome to the Ultimaker Community of 3D printing experts. Visit the following links to read more about our Terms of Use or our Privacy Policy. Thank you!