Home Tags Md5

Tag: md5

Dridex: A History of Evolution

In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.

Ztorg: money for infecting your smartphone

This research started when we discovered an infected Pokeacute;mon GO guide in Google Play. We detected the malware as Trojan.AndroidOS.Ztorg.ad.

After some searching, I found some other similar infected apps that were being distributed from the Google Play Store.

After I started tracking these infected apps, two things struck me – how rapidly they became popular and the comments in the user review sections.

Use of DNS Tunneling for C&C Communications

Often, virus writers don't even bother to run encryption or mask their communications. However, you do get the occasional off-the-wall approaches that don't fall into either of the categories.

Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.

XPan, I am your father

While we have previously written on the now infamous XPan ransomware family, some of it’s variants are still affecting users primarily located in Brazil.

This sample is what could be considered as the “father” of other XPan ransomware variants.

A considerable amount of indicators within the source code depict the early origins of this sample.

Old Malware Tricks To Bypass Detection in the Age of Big...

Kaspersky Lab has been tracking a targeted attack actor’s activities in Japan and South Korea recently.

This attacker has been using the XXMM malware toolkit, which was named after an original project path revealed through a pdb string inside the… Read Full Article

ATMitch: remote administration of ATMs

In February 2017, we published research on fileless attacks against enterprise networks.

This second paper is about the methods and techniques that were used by the attackers in the second stage of their attacks against financial organizations – basically enabling remote administration of ATMs.

PetrWrap: the new Petya-based ransomware used in targeted attacks

This year we found a new family of ransomware used in targeted attacks against organizations.

After penetrating an organization's network the threat actors used the PsExec tool to install ransomware on all endpoints and servers in the organization.

The next interesting fact about this ransomware is that the threat actors decided to use the well-known Petya ransomware to encrypt user data.

At death’s door for years, widely used SHA1 function is now...

Algorithm underpinning Internet security falls to first-known collision attack.

New(ish) Mirai Spreader Poses New Risks

A cross-platform win32-based Mirai spreader and botnet is in the wild and previously discussed publicly. However, there is much information confused together, as if an entirely new IoT bot is spreading to and from Windows devices.

This is not the case.
Instead, an accurate assessment is that a previously active Windows botnet is spreading a Mirai bot variant.

KopiLuwak: A New JavaScript Payload from Turla

A new, unique JavaScript payload is now being used by Turla in targeted attacks.

This new payload, dubbed KopiLuwak, is being delivered using embedded macros within Office documents.

RHSA-2017:0190-1: Critical: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 5, Red HatEnterprise Linux 6, and Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Mozilla Firefox is an open source web browser.This update upgrades Firefox to version 45.7.0 ESR.Security Fix(es):* Multiple flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Firefox to crash or, potentially,execute arbitrary code with the privileges of the user running Firefox.(CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380,CVE-2017-5383, CVE-2017-5386, CVE-2017-5390, CVE-2017-5396)Red Hat would like to thank the Mozilla project for reporting these issues.Upstream acknowledges Jann Horn, Muneaki Nishimura, Nils, Armin Razmjou,Christian Holler, Gary Kwong, André Bargull, Jan de Mooij, Tom Schuster, andOriol, Rh0, Nicolas Grégoire, and Jerri Rice as the original reporters. Red Hat Enterprise Linux (v. 5 server) SRPMS: firefox-45.7.0-1.el5_11.src.rpm     MD5: 2b1dec6ead6378170de4bc8a7684043fSHA-256: e76106926213b88f14d6e1032bc6cf7a443dd36c20fe860eac94e526c49baa61   IA-32: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632   PPC: firefox-45.7.0-1.el5_11.ppc64.rpm     MD5: 8b25ba172ad088253983c0df0bcf17c5SHA-256: 36389c08ccb8e1362dde937e65ea12326228ce32c552eeeeaddedf83b10cca00 firefox-debuginfo-45.7.0-1.el5_11.ppc64.rpm     MD5: b85a6bc7bec3d6d863f8bfdaa4710f72SHA-256: 83f4042c1f550793634cf60a0dfeae96451562accb1aa3d8997d63975c6493ec   s390x: firefox-45.7.0-1.el5_11.s390x.rpm     MD5: adcf2bbf86d194fa27d53fcdf69a2546SHA-256: 5303f6b6d26a3194eae69ae23139ae3d6c678355ad8118464ea93c18c40b9420 firefox-debuginfo-45.7.0-1.el5_11.s390x.rpm     MD5: 82103fbf027df425402f65f9aa04683bSHA-256: a3235e409b16349d799fab84aa7c58edb0320c10cacaff413b38fda47bbfce76   x86_64: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-45.7.0-1.el5_11.x86_64.rpm     MD5: 6d04b3beec9bd3c885f60507668393caSHA-256: 3fc61aa258633191a6fdb97a601f5cffbdf8d782c2809bda3e80f3156359a3e0 firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632 firefox-debuginfo-45.7.0-1.el5_11.x86_64.rpm     MD5: 7e0442cef583cf3eafe949a7bdc65c62SHA-256: 82358fd4a0f3c6b532f65410dc5c075c82d6708cad49f6bedc31d6512d8312ea   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: firefox-45.7.0-1.el5_11.src.rpm     MD5: 2b1dec6ead6378170de4bc8a7684043fSHA-256: e76106926213b88f14d6e1032bc6cf7a443dd36c20fe860eac94e526c49baa61   IA-32: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632   x86_64: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-45.7.0-1.el5_11.x86_64.rpm     MD5: 6d04b3beec9bd3c885f60507668393caSHA-256: 3fc61aa258633191a6fdb97a601f5cffbdf8d782c2809bda3e80f3156359a3e0 firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632 firefox-debuginfo-45.7.0-1.el5_11.x86_64.rpm     MD5: 7e0442cef583cf3eafe949a7bdc65c62SHA-256: 82358fd4a0f3c6b532f65410dc5c075c82d6708cad49f6bedc31d6512d8312ea   Red Hat Enterprise Linux Desktop (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   IA-32: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Desktop (v. 7) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Server (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   IA-32: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00   PPC: firefox-45.7.0-1.el6_8.ppc64.rpm     MD5: 069e4d823d63aef85ba7ca2d517d1bf2SHA-256: 62d4942969861419d190e8eeaf4459212b004e81929cd8014000d788b6857942 firefox-debuginfo-45.7.0-1.el6_8.ppc64.rpm     MD5: da598e8f60df66a59c858f8c11724f9fSHA-256: c3d0e0be7ee2d1894f4f82cc79bd8c4952dafc55db3199d60fc5a5b904154eb7   s390x: firefox-45.7.0-1.el6_8.s390x.rpm     MD5: 4da0b635699941fcdf51d5b721aaaf5dSHA-256: e7162344260685a638e0dc6f6926e7c68c801216ed12ef9014cff2b9d0fc94bd firefox-debuginfo-45.7.0-1.el6_8.s390x.rpm     MD5: 586724a7fe10e97b0b20ddfa66e5100bSHA-256: 6172b8ed83851ba2adc69e9ec8191f9be4137f2e2b839773075cdb696fc73227   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Server (v. 7) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   PPC: firefox-45.7.0-1.el7_3.ppc64.rpm     MD5: 84f58bd190215a79e84c57e657362164SHA-256: 8fd176f5ee79ec47777ca389793f5c985fb93e4e1c7df1bef980fb84e2cf25b1 firefox-debuginfo-45.7.0-1.el7_3.ppc64.rpm     MD5: 42ea902950f1abe079daa22a4f7e180fSHA-256: 98324d749df96c7269bc4f594b0358a6382026d5b33bb674e74186436171d81d   PPC64LE: firefox-45.7.0-1.el7_3.ppc64le.rpm     MD5: a26021d328466ae57dcb69b6036c3633SHA-256: 9bfa70ed36ccdac48b14280b06fcdd0a2fdc6689e3d280b9194635dac364572b firefox-debuginfo-45.7.0-1.el7_3.ppc64le.rpm     MD5: dfb22651c1cec514c1c8f846a02bd092SHA-256: ef981d61acb85dbd0cb8ef4bfb94db14ce220687d894cc463d52d1114246be3f   s390x: firefox-45.7.0-1.el7_3.s390x.rpm     MD5: 88229dd866fcfef6faa5c70238a1d43fSHA-256: f5bdb8710b8b5c355aef7f140c727ec5306409e9f746d5a9de23ec20467e5b6e firefox-debuginfo-45.7.0-1.el7_3.s390x.rpm     MD5: 5fd8d473955c6a0427670310b9e476d6SHA-256: 2e3883f704972ba8034b92986592c6e3b70fa5cdd17450cfbe6ed7db0b15d426   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   IA-32: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHEA-2017:0188-1: new packages: kmod-rtsx_pci

New kmod-rtsx_pci packages are now available for Red Hat Enterprise Linux 6. The kmod-rtsx_pci packages contain the Realtek card reader RTS5250S SD4.0 driverkernel module.

These packages add support for the Realtek RTS5250S card reader.The PCI ID supported by these packages: 10EC:525AThe kernel modules delivered by this erratum have been made available aspart of the Red Hat Driver Update Program, which provides updated kernelmodules that add support for selected devices in advance of the next RedHat Enterprise Linux minor update release. We strongly recommend thatthese kernel modules are used only to enable the specific hardware mentioned inthis erratum.

For all other devices that require this driver, partners andcustomers are recommended to continue to use the driver that is shipped in thelatest Red Hat Enterprise Linux kernel. (BZ#1410849)All users who require kmod-rtsx_pci are advised to install these new packages. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   IA-32: kmod-rtsx_pci-642-1.el6_8.i686.rpm     MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb rtsx_pci-debuginfo-642-1.el6_8.i686.rpm     MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   Red Hat Enterprise Linux Server (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   IA-32: kmod-rtsx_pci-642-1.el6_8.i686.rpm     MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb rtsx_pci-debuginfo-642-1.el6_8.i686.rpm     MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   IA-32: kmod-rtsx_pci-642-1.el6_8.i686.rpm     MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb rtsx_pci-debuginfo-642-1.el6_8.i686.rpm     MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: