Introduction - If you have any usage issues, please Google them yourself
1. Find out the web site of the downloader
2, add this site to our blacklist so our products can be intercepted to the site
3. Analyze the files downloaded by JS Trojan horse, classify them and extract features
4. Classify the JS Trojan samples and extract characteristics
5. Analyze the ascription of malicious websites and combine the social workers' library to find out the composers of the Trojan horse.