An implementation of the udpstorm attack.
destructive program [F-Prot]FDoS-Udp.Storm trojan [McAfee]Flooder Program [Panda]Flooder.UDP.Storm [Kaspersky]Win32/Flooder.UDP.Storm trojan [Eset]
udpstorm.exe