RussianArmenian
Back to Home
 

Network News

Apr 9, 2013
Maintenance works in one of our data centers
Dear customers, Please, be informed about maintenance works in one of our data centers between 6:00 and 8:00 AM on April 10.

Feb 20, 2012
Arminco appointed Xorcom's distributor in Armenia
Arminco, a leading ISP and ITSP in Armenia, announced its appointment as Xorcom's distributor in Armenia. Arminco will be distributing the entire range of Xorcom's IP-PBX including videoconferencing systems, Astribank channel banks and IP phones in the local market.

Jun 1, 2011
Termination of the prepaid international phone cards service
As announced earlier, June 1st, 2011 is the termination date for the "Heradzayn" prepaid VoIP service. The access number for the service (010 295309) is disconnected and is no longer in service. ARMINCO offers its Non-geographic Armenian number service as an enhanced replacement for the old service.

May 4, 2011
Fibercut in Yerevan - Armavir part

Dear Customers,
Fibernet NOC informed us, that there a fibercut in Yerevan - Armavir part.
Start time: 03.05.2011 23:43 (GMT +4)
End time: 04.05.2011 09:02 (GMT +4)
Outage 9h 19m

CBA Currency Exchange Rates as of 2013-06-11
US DollarUSD1411.94 AMDBritish PoundGBP1640.44 AMD
EuroEUR1547.06 AMDIranian RialIRR1003.36 AMD
Canadian DollarCAD1402.32 AMDJapanese YenJPY1042.50 AMD
United Arab Emirates DirhamAED1112.15 AMDRussian RoubleRUB112.72 AMD
Ukraine HryvniaUAH150.63 AMDGeorgian LariGEL1248.76 AMD

Virus / Spyware Alerts

2013-01-24 14:51 | Securelist / Descriptions
Trojan.Win32.Jorik.Buterat.dp
A trojan program that carries out destructive actions on the user's computer. It is a Windows application (PE-EXE file). 56832 bytes. Packed by an unknown packer. Unpacked size - around 53 kB....

2013-01-24 14:34 | Securelist / Descriptions
AdWare.Win32.Gamevance.hfti
Adware designed to redirect user searches to other web resources. It is a Windows application (PE-EXE file). 1135840 bytes. Written in C++. Installation The trojan is installed as an add-in for the...

2013-01-23 14:40 | Securelist / Descriptions
Trojan-Downloader.Win32.Small.bven
A trojan program that downloads files from the internet without the user's knowledge and launches them. It is a Windows application (PE-EXE file). 7168 bytes. Written in C++. Installation When...

2013-01-23 12:50 | Securelist / Descriptions
Trojan.NSIS.Miner.a
A trojan program. It is a Windows application (PE-EXE file). 244927 bytes. This malware is created using the system to create the installation packages Nullsoft Scriptable Install...

2013-01-23 12:40 | Securelist / Descriptions
Trojan.Java.Agent.an
A trojan program that downloads files from the Internet without the user's knowledge and launches them. It is a JAR-archive containing a set of Java-classes (class-files). 15661 bytes.

2013-01-22 15:39 | Securelist / Descriptions
Exploit.JS.CVE-2010-4452.t
After launching the malicious HTML-document, using Java Script tools, it is decoded and a code is recorded in its body which carries out the following actions: it launches a script, the location of...

2013-01-22 15:29 | Securelist / Descriptions
Trojan-Downloader.JS.Agent.gcv
After opening the malicious HTML page in the browser, it displays the following message: 404 Not Found Then, using Java Script, the trojan collects system information, in particular: The type of OS...

2013-01-22 13:22 | Securelist / Descriptions
Trojan-Dropper.Win32.StartPage.eba
If the path to the trojan file does not contain a sequence of "ommon" symbols, the trojan will retrieve a script from its body and will launch this script under the following name: %ProgramFiles%\<...

2013-01-21 13:00 | Securelist / Descriptions
Trojan-Dropper.Win32.Agent.ezqm
A trojan program that installs and launches other software on the infected computer without the user's knowledge. It is a Windows application (PE-EXE file). 231124 bytes. Written in C++.

2013-01-21 12:56 | Securelist / Descriptions
Trojan-Downloader.Win32.VB.aiqx
When launching, the trojan downloads a file from the internet using the following link: http://<rnd>.***heker.com Where <rnd> is a random sequence of digits. The link did not work...