File details
File name: bfp4f.exe
Name: Battlefield Play4free
Description: BFP4f Application
Version: 1, 0, 0, 0
Size: 16.03 MB
Original file name: BFP4f.exe
Resource utilization
 | CPU utilization averages |
Total CPU: 0.0041723148%
Privileged CPU:
0.0034886162%

User CPU:
0.00068369864257%

Privileged CPU time: 392515.62 ms
Privileged CPU time /min: 2,075 ms
CPU cycle count:
1,144,191,952
CPU cycle count /min: 1,700,489,119
 | Memory utilization averages |
Committed memory:
1.2 GB
Peak committed memory: 1.65 GB
Paged memory:
554.16 MB
Peak paged memory: 1.33 GB
Paged system memory:
388.46 KB
Non-paged system memory: 60.71 KB
Working set memory:
481.07 MB
Peak working set memory: 1.27 GB
Min working set memory: 181.06 MB
Private memory:
554.16 MB
Page faults:
48,565,610
Page faults /min: 256,679
 | Process I/O averages |
Total read operations:
558,954
Read operations /min: 2,954
Read transfer /min: 37.68 MB
Total write operations:
13,369
Write operations /min: 71
Total write transfer: 8.67 MB
Write transfer /min: 46.9 KB
Total other operations:
333,555
Other operations /min: 1,763
Total other transfer: 70.77 MB
Other Transfer /min: 382.99 KB
 | GUI Object Averages |
GDI objects:
264
Peak GDI objects: 716
USER objects:
72
Peak USER objects: 78
Resources
Handle count average: 705
Thread count average: 23
Thread resource averages
Total CPU: 30.693524219310%
Privileged CPU: 0.442745794323%
User CPU: 30.250778424986%
CPU Cycle count /sec: 626,566,887
Context switches /sec: 216
Module memory size: 17.43 MB
d3d9.dll

Total CPU: 13.386501083957%
Privileged CPU: 1.950860610957%
User CPU: 11.435640473000%
CPU Cycle count /sec: 261,080,477
Context switches /sec: 505
Module memory size: 1.76 MB
Total CPU: 0.728545428809%
Privileged CPU: 0.052234964017%
User CPU: 0.676310464791%
CPU Cycle count /sec: 15,416,116
Context switches /sec: 14
Module memory size: 11.03 MB
winmm.dll

Total CPU: 0.104968404689%
Privileged CPU: 0.001642269695%
User CPU: 0.103326134994%
CPU Cycle count /sec: 67,387,920
Context switches /sec: 48
Module memory size: 200 KB
dinput8.dll

Total CPU: 0.085725512501%
Privileged CPU: 0.043410523104%
User CPU: 0.042314989398%
CPU Cycle count /sec: 2,056,320
Context switches /sec: 40
Module memory size: 192 KB
Total CPU: 0.005517267226%
Privileged CPU: 0.003012210835%
User CPU: 0.002505056391%
CPU Cycle count /sec: 129,578
Module memory size: 14.68 MB
ntdll.dll

Total CPU: 0.001095303263%
Privileged CPU: 0.000430198464%
User CPU: 0.000665104799%
CPU Cycle count /sec: 34,457
Context switches /sec: 1
Module memory size: 1.23 MB
dsound.dll

Total CPU: 0.000547751664%
Privileged CPU: 0.000273873347%
User CPU: 0.000273878317%
CPU Cycle count /sec: 1,951,317
Context switches /sec: 51
Module memory size: 456 KB
gdiplus.dll

Total CPU: 0.000136836660%
Privileged CPU: 0.000000000000%
User CPU: 0.000136836660%
CPU Cycle count /sec: 1,704
Module memory size: 1.56 MB
Process details
Runs as (owner): User
Integrety level: Medium
Windows platform: 32-bit
Parent Process
Process Command
"C:\Program Files\EA Games\Battlefield Play4Free\BFP4f.exe" +survey 0 +dc 1 +sessionId tpd3d4412hubcn16vepsav1m14 +webSiteHostName battlefield.play4free.com +lang en +soldierName "CarpalMan"
Network connectivity
UDP: LISTENING on port 54268
TCP: 94.236.97.4 on port 2023
Image hashes
MD5: ab525f1267c3255b2bf41d86306cd4b8
SHA-1: 062070fa0347e58cead17a7d93e74e61c7a42688
SHA-256: 495d8c7a8cea0e0a7340854528292f48b4ae0b3df1e211d3c81255d956a16421
PE image details
Subsystem: Windows GUI
Langauge*: Microsoft Visual C++ 9.0
File packed: No
Import Table
advapi32.dll

RegOpenKeyExA
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegEnumKeyExA
dbghelp.dll

dice_py.dll

PyCFunction_NewEx
PyBool_FromLong
PyErr_Format
Py_NoSiteFlag
Py_Initialize
PyRun_SimpleString
PyDict_New
PyClass_New
Py_IsInitialized
Py_Finalize
PyObject_CallObject
PyTuple_Size
PyObject_CallMethod
PyObject_SetAttrString
PyImport_ImportModule
PyModule_GetDict
PyDict_GetItemString
PyCallable_Check
PyObject_CallFunction
Py_InitModule4
PyMethod_New
PyInt_FromLong
PyTuple_SetItem
PyTuple_New
_Py_NoneStruct
PyErr_Occurred
PyInt_AsLong
PyErr_SetString
PyExc_RuntimeError
PyType_IsSubtype
PyInt_Type
PyFloat_AsDouble
PyFloat_Type
PyString_AsString
PyString_Type
PyString_FromString
PyErr_Clear
PyLong_FromLongLong
PyFloat_FromDouble
PyObject_GetAttrString
Py_VerboseFlag
PyTuple_Type
PyTuple_GetItem
PyErr_Print
PyCObject_AsVoidPtr
PyCObject_Type
PyCObject_FromVoidPtr
dinput8.dll

gdi32.dll

gdiplus.dll

GdipCreateBitmapFromStream
GdipCloneImage
GdipFree
GdipAlloc
GdipDeleteGraphics
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromStreamICM
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
GdipDrawImageRectI
iphlpapi.dll

IcmpSendEcho2
IcmpCloseHandle
IcmpCreateFile
GetIfEntry
GetIfTable
GetAdaptersAddresses
GetAdaptersInfo
kernel32.dll

GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleA
GlobalMemoryStatus
SetProcessWorkingSetSize
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetCurrentProcessId
GetCurrentProcess
SetPriorityClass
Sleep
lstrlenW
GetModuleFileNameA
GetLocaleInfoA
ReleaseMutex
CreateMutexA
GetLastError
QueryPerformanceCounter
SetThreadPriority
GetCurrentThread
CreateThread
CreateDirectoryW
WriteFile
SetFilePointer
SetConsoleCursorPosition
GetOverlappedResult
GetFullPathNameA
DeleteFileW
MoveFileW
CopyFileW
ReadFile
WriteConsoleOutputCharacterA
SetConsoleTitleA
FindClose
FindFirstFileW
GetCurrentDirectoryW
CreateFileW
FindNextChangeNotification
GetCurrentDirectoryA
FindCloseChangeNotification
SetEvent
FindNextFileW
FindFirstChangeNotificationA
ReleaseSemaphore
GetCurrentThreadId
FormatMessageA
SetConsoleCtrlHandler
SetConsoleScreenBufferSize
SetConsoleWindowInfo
SetConsoleMode
GetStdHandle
AllocConsole
FreeConsole
ReadConsoleInputA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
FindNextFileA
FindFirstFileA
GetGeoInfoA
GetUserGeoID
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetProcessTimes
GetThreadTimes
GetExitCodeThread
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateThread
GetVersionExA
LoadLibraryExA
GetUserDefaultLangID
InterlockedExchange
CreateEventA
ResetEvent
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
OutputDebugStringA
GetFileSize
GetComputerNameA
QueryPerformanceFrequency
msvcp90.dll
msvcr90.dll
ole32.dll

shell32.dll

ShellExecuteA
SHGetFolderPathW
SHFileOperationW
ShellExecuteExA
user32.dll

BeginPaint
ToAsciiEx
MapVirtualKeyExA
GetKeyboardState
GetKeyboardLayout
EndPaint
MoveWindow
PtInRect
UnregisterClassA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetWindowRect
SetWindowLongA
GetWindowLongA
DefWindowProcA
SetCapture
ReleaseCapture
DestroyWindow
SystemParametersInfoA
SetCursor
LoadCursorFromFileA
LoadImageA
ShowCursor
SetWindowTextA
OpenIcon
CloseWindow
SetForegroundWindow
SetFocus
UpdateWindow
MessageBoxA
SetWindowPos
SendInput
GetKeyState
GetAsyncKeyState
GetFocus
DispatchMessageA
TranslateMessage
PeekMessageA
PostMessageA
PostQuitMessage
IsWindow
ShowWindow
IsIconic
SendMessageA
FindWindowExA
wsprintfW
GetSystemMetrics
GetClientRect
winhttp.dll

WinHttpCloseHandle
WinHttpSetOption
WinHttpOpen
WinHttpReadData
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetTimeouts
WinHttpConnect
WinHttpOpenRequest
WinHttpCrackUrl
wininet.dll

InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
winmm.dll

waveOutGetDevCapsA
waveInPrepareHeader
waveOutUnprepareHeader
waveInUnprepareHeader
waveInClose
waveInOpen
waveInReset
waveInGetDevCapsA
waveInGetNumDevs
waveOutClose
waveOutOpen
waveOutReset
waveOutPrepareHeader
waveOutGetNumDevs
waveOutWrite
waveOutSetVolume
waveInStart
waveInAddBuffer
waveInGetPosition
waveInStop
waveOutMessage
waveInMessage
ws2_32.dll

WSAWaitForMultipleEvents
WSAIoctl
WSACreateEvent
WSACloseEvent
WSASetEvent
WSARecv
WSARecvFrom
WSAResetEvent
WSAGetOverlappedResult