http://%76%63%63%64%2E%63%6E
\x3C\x73\x63\x72\x69\x70\x74\x20\x73\x72\x63\x3D\x68\x74\x74\x70\x3A\x2F\x2F\x4F\x25\x36\x36\x25\x36\x36\x25\x34\x39\x25\x36\x33\x65\x25\x32\x45\x25\x34\x36\x25\x34\x31\x51\x25\x35\x33\x25\x36\x35\x25\x37\x32\x76\x2E\x25\x34\x33\x25\x36\x46\x25\x34\x44\x2F\x25\x34\x36\x25\x34\x31\x25\x35\x31\x25\x32\x45\x25\x36\x41\x25\x37\x33\x3E\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E
http://51yes.ocry.com/click2.js?id=
DZNHkqNIAADv85HpDg4tTGFidrYDCRBOOOEvG
php eval($_POST
$O00OO0
Round($packets/$exec_time
$max_time = time()+$exec_time
ѪDDOS
·
$oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0

רASPС

Serv-uȨ

hytop

ϱ
89625866
ִCMD
Execute session
Execute request
72C24DD5-D70A-438B-8A42-98424B88AFB8
13709620-C279-11CE-A49E-444553540000
F935DC26-1CF0-11D0-ADB9-00C04FD58A0B
Ȩ
ź
asp
):EvaL(
дעֵɹ
VBScript.Encode
$max_time = $time()+$exec_time