├── dbx_bin ├── arm64_DBXUpdate_2025-02-25.bin ├── x64_DBXUpdate_2023-03-14.bin ├── x64_DBXUpdate_2023-05-09.bin ├── x64_DBXUpdate_2025-01-14.bin ├── x64_DBXUpdate_2025-06-11.bin └── x64_DBXUpdate_2025-10-14.bin ├── Check Windows state.cmd ├── Check UEFI PK, KEK, DB and DBX.cmd ├── Apply 2023 KEK, DB and bootmgfw update.cmd ├── Show Secure Boot update events.cmd ├── Show UEFI PK, KEK, DB and DBX.cmd ├── Apply DBX update.cmd ├── Apply revocations.cmd ├── Check EFI file info.cmd ├── ps ├── Check-Dbx-Simplified.ps1 ├── Get-BootMgrSecurityVersion.ps1 ├── Get-PEInfo.ps1 ├── Get-SBAT.ps1 ├── Check Windows state.ps1 ├── Get-UEFIDatabaseSignatures.ps1 └── Check UEFI PK, KEK, DB and DBX.ps1 ├── README.md └── dbx_info └── dbx_info.csv /dbx_bin/arm64_DBXUpdate_2025-02-25.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cjee21/Check-UEFISecureBootVariables/HEAD/dbx_bin/arm64_DBXUpdate_2025-02-25.bin -------------------------------------------------------------------------------- /dbx_bin/x64_DBXUpdate_2023-03-14.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cjee21/Check-UEFISecureBootVariables/HEAD/dbx_bin/x64_DBXUpdate_2023-03-14.bin -------------------------------------------------------------------------------- /dbx_bin/x64_DBXUpdate_2023-05-09.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cjee21/Check-UEFISecureBootVariables/HEAD/dbx_bin/x64_DBXUpdate_2023-05-09.bin -------------------------------------------------------------------------------- /dbx_bin/x64_DBXUpdate_2025-01-14.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cjee21/Check-UEFISecureBootVariables/HEAD/dbx_bin/x64_DBXUpdate_2025-01-14.bin -------------------------------------------------------------------------------- /dbx_bin/x64_DBXUpdate_2025-06-11.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cjee21/Check-UEFISecureBootVariables/HEAD/dbx_bin/x64_DBXUpdate_2025-06-11.bin -------------------------------------------------------------------------------- /dbx_bin/x64_DBXUpdate_2025-10-14.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cjee21/Check-UEFISecureBootVariables/HEAD/dbx_bin/x64_DBXUpdate_2025-10-14.bin -------------------------------------------------------------------------------- /Check Windows state.cmd: -------------------------------------------------------------------------------- 1 | :: Created by github.com/cjee21 2 | @title Check Windows state 3 | @powershell -ExecutionPolicy Bypass -Command "& '%~dp0ps\Check Windows state.ps1'" 4 | @echo. 5 | @pause 6 | -------------------------------------------------------------------------------- /Check UEFI PK, KEK, DB and DBX.cmd: -------------------------------------------------------------------------------- 1 | :: Created by github.com/cjee21 2 | @title Check UEFI PK, KEK, DB and DBX 3 | @powershell -ExecutionPolicy Bypass -Command "& '%~dp0ps\Check UEFI PK, KEK, DB and DBX.ps1'" 4 | @echo. 5 | @pause 6 | -------------------------------------------------------------------------------- /Apply 2023 KEK, DB and bootmgfw update.cmd: -------------------------------------------------------------------------------- 1 | reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x5944 /f 2 | powershell -Command "Start-ScheduledTask -TaskName \""\Microsoft\Windows\PI\Secure-Boot-Update\""" 3 | -------------------------------------------------------------------------------- /Show Secure Boot update events.cmd: -------------------------------------------------------------------------------- 1 | :: Created by github.com/cjee21 2 | @title Show Secure Boot update events 3 | @powershell -Command "Get-WinEvent -FilterHashtable @{ProviderName='microsoft-windows-tpm-wmi'; Id=1032,1033,1034,1035,1036,1037,1043,1044,1045,1795,1796,1797,1798,1799,1801,1808}" 4 | @echo. 5 | @pause 6 | -------------------------------------------------------------------------------- /Show UEFI PK, KEK, DB and DBX.cmd: -------------------------------------------------------------------------------- 1 | :: Created by github.com/cjee21 2 | @title Show UEFI PK, KEK, DB and DBX 3 | @powershell -ExecutionPolicy Bypass -Command "& Import-Module '%~dp0ps\Get-UEFIDatabaseSignatures.ps1'; $FormatEnumerationLimit = -1; Write-Output "PK:"; Get-SecureBootUEFI -Name pk | Get-UEFIDatabaseSignatures | Format-List; Write-Output "KEK:"; Get-SecureBootUEFI -Name kek | Get-UEFIDatabaseSignatures | Format-List; Write-Output "DB:"; Get-SecureBootUEFI -Name db | Get-UEFIDatabaseSignatures | Format-List; Write-Output "DBX:"; Get-SecureBootUEFI -Name dbx | Get-UEFIDatabaseSignatures | Format-List" 4 | @echo. 5 | @pause 6 | -------------------------------------------------------------------------------- /Apply DBX update.cmd: -------------------------------------------------------------------------------- 1 | @echo off 2 | 3 | set DesiredAvailableUpdates=0x2 4 | echo Desired AvailableUpdates: %DesiredAvailableUpdates% 5 | 6 | FOR /F "tokens=3*" %%A IN ('REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates 2^>nul') DO ( 7 | SET CurrentAvailableUpdates=%%A 8 | ) 9 | echo Current AvailableUpdates: %CurrentAvailableUpdates% 10 | 11 | set /a "TargetAvailableUpdates = %CurrentAvailableUpdates% | %DesiredAvailableUpdates%" 12 | FOR /F "tokens=*" %%A IN ('powershell -Command "\""0x{0:X}\"" -f %TargetAvailableUpdates%"') DO ( 13 | SET TargetAvailableUpdates=%%A 14 | ) 15 | 16 | echo Setting AvailableUpdates to %TargetAvailableUpdates% 17 | reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d %TargetAvailableUpdates% /f 18 | 19 | echo Starting \Microsoft\Windows\PI\Secure-Boot-Update 20 | powershell -Command "Start-ScheduledTask -TaskName \""\Microsoft\Windows\PI\Secure-Boot-Update\""" 21 | 22 | pause 23 | -------------------------------------------------------------------------------- /Apply revocations.cmd: -------------------------------------------------------------------------------- 1 | @echo off 2 | 3 | set DesiredAvailableUpdates=0x682 4 | echo Desired AvailableUpdates: %DesiredAvailableUpdates% 5 | 6 | FOR /F "tokens=3*" %%A IN ('REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates 2^>nul') DO ( 7 | SET CurrentAvailableUpdates=%%A 8 | ) 9 | echo Current AvailableUpdates: %CurrentAvailableUpdates% 10 | 11 | set /a "TargetAvailableUpdates = %CurrentAvailableUpdates% | %DesiredAvailableUpdates%" 12 | FOR /F "tokens=*" %%A IN ('powershell -Command "\""0x{0:X}\"" -f %TargetAvailableUpdates%"') DO ( 13 | SET TargetAvailableUpdates=%%A 14 | ) 15 | 16 | echo Setting AvailableUpdates to %TargetAvailableUpdates% 17 | reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d %TargetAvailableUpdates% /f 18 | 19 | echo Starting \Microsoft\Windows\PI\Secure-Boot-Update 20 | powershell -Command "Start-ScheduledTask -TaskName \""\Microsoft\Windows\PI\Secure-Boot-Update\""" 21 | 22 | pause 23 | -------------------------------------------------------------------------------- /Check EFI file info.cmd: -------------------------------------------------------------------------------- 1 | :: Created by github.com/cjee21 2 | @echo off 3 | title EFI File Info 4 | 5 | if "%~1" == "" ( 6 | set /p filepath="Path to EFI file: " 7 | ) else ( 8 | set filepath=%~1 9 | ) 10 | 11 | powershell -ExecutionPolicy Bypass -Command "Import-Module '%~dp0\ps\Get-PEInfo.ps1'; try { $ErrorActionPreference = 'Stop'; Get-PEInfo -FilePath %filepath% | Format-List } catch {}" 12 | 13 | echo File Information: 14 | powershell -Command "(Get-Item -Path %filepath%).VersionInfo | Format-List" 15 | 16 | echo Signature Certificate: 17 | powershell -Command "try { [System.Security.Cryptography.X509Certificates.X509Certificate2]::new([System.Security.Cryptography.X509Certificates.X509Certificate]::CreateFromSignedFile('%filepath%')) | Format-List } catch { \""No certificate found\"" }" 18 | 19 | powershell -ExecutionPolicy Bypass -Command "Import-Module '%~dp0\ps\Get-BootMgrSecurityVersion.ps1'; try { $ErrorActionPreference = 'Stop'; $SVN_bytes = Get-BootMgrSecurityVersionBytes -Path %filepath% } catch {}; if ($SVN_bytes) { $svn_ver_minor = [System.BitConverter]::ToInt16($SVN_bytes[0..1], 0); $svn_ver_major = [System.BitConverter]::ToInt16($SVN_bytes[2..3], 0); \""BOOTMGRSECURITYVERSIONNUMBER: $([version]::new($svn_ver_major, $svn_ver_minor))\"" } " 20 | 21 | powershell -ExecutionPolicy Bypass -Command "Import-Module '%~dp0\ps\Get-SBAT.ps1'; try { $ErrorActionPreference = 'Stop'; $SBAT = Get-SBAT -FilePath %filepath% } catch {}; if ($SBAT) { Write-Host \""SBAT:\""; Write-Host \""$SBAT\"" } " 22 | 23 | echo. 24 | echo. 25 | echo. 26 | 27 | pause 28 | -------------------------------------------------------------------------------- /ps/Check-Dbx-Simplified.ps1: -------------------------------------------------------------------------------- 1 | # From https://gist.github.com/out0xb2/f8e0bae94214889a89ac67fceb37f8c0#file-check-dbx-ps1 2 | # Modified by github.com/cjee21 3 | 4 | $patchfile = $args[0] 5 | 6 | if ($patchfile -eq $null) { 7 | Write-Host "Patchfile not specified!`n" 8 | Break 9 | } 10 | $patchfile = (gci -literalpath $patchfile).FullName 11 | 12 | Import-Module -Force "$PSScriptRoot\Get-UEFIDatabaseSignatures.ps1" 13 | 14 | $DbxRaw = Get-SecureBootUEFI dbx 15 | $DbxFound = $DbxRaw | Get-UEFIDatabaseSignatures 16 | 17 | $DbxBytesRequired = [IO.File]::ReadAllBytes($patchfile) 18 | $DbxRequired = Get-UEFIDatabaseSignatures -BytesIn $DbxBytesRequired 19 | 20 | # Flatten into an array of required EfiSignatureData data objects 21 | $RequiredArray = foreach ($EfiSignatureList in $DbxRequired) { 22 | Write-Verbose $EfiSignatureList 23 | foreach ($RequiredSignatureData in $EfiSignatureList.SignatureList) { 24 | Write-Verbose $RequiredSignatureData 25 | $RequiredSignatureData.SignatureData 26 | } 27 | } 28 | Write-Information "Required `n" $RequiredArray 29 | 30 | # Flatten into an array of EfiSignatureData data objects (read from dbx) 31 | $FoundArray = foreach ($EfiSignatureList in $DbxFound) { 32 | Write-Verbose $EfiSignatureList 33 | foreach ($FoundSignatureData in $EfiSignatureList.SignatureList) { 34 | Write-Verbose $FoundSignatureData 35 | $FoundSignatureData.SignatureData 36 | } 37 | } 38 | Write-Information "Found `n" $FoundArray 39 | 40 | $successes = 0 41 | $failures = 0 42 | $requiredCount = $RequiredArray.Count 43 | foreach ($RequiredSig in $RequiredArray) { 44 | if ($FoundArray -contains $RequiredSig) { 45 | Write-Information "FOUND: $RequiredSig" 46 | $successes++ 47 | } else { 48 | Write-Information "!!! NOT FOUND`n$RequiredSig`n!!!`n" 49 | $failures++ 50 | } 51 | $i = $successes + $failures 52 | Write-Progress -Activity 'Checking if all patches applied' -Status "Checking element $i of $requiredCount" -PercentComplete ($i/$requiredCount *100) 53 | } 54 | 55 | if ($failures -ne 0) { 56 | Write-Host "FAIL: $failures failures, $successes successes detected" -ForegroundColor Red 57 | # $DbxRaw.Bytes | sc -encoding Byte dbx_found.bin 58 | } elseif ($successes -ne $RequiredArray.Count) { 59 | Write-Error "!!! Unexpected: $successes != $requiredCount expected successes!" 60 | } elseif ($successes -eq 0) { 61 | Write-Error "!!! Unexpected failure: no successes detected, check command-line usage." 62 | } else { 63 | Write-Host "SUCCESS: $successes successes detected" -ForegroundColor Green 64 | } 65 | -------------------------------------------------------------------------------- /ps/Get-BootMgrSecurityVersion.ps1: -------------------------------------------------------------------------------- 1 | # Generated by Google AI 2 | 3 | function Get-BootMgrSecurityVersionBytes { 4 | [CmdletBinding()] 5 | param( 6 | [Parameter(Mandatory = $true, Position = 0)] 7 | [string]$Path 8 | ) 9 | 10 | # Define Windows API functions using P/Invoke 11 | if (-not ([PSObject].Assembly.GetType("ResourceHelper"))) { 12 | Add-Type -TypeDefinition @' 13 | using System; 14 | using System.Runtime.InteropServices; 15 | using System.Text; 16 | 17 | public class ResourceHelper { 18 | [DllImport("kernel32.dll", SetLastError = true)] 19 | public static extern IntPtr LoadLibraryEx(string lpFileName, IntPtr hFile, uint dwFlags); 20 | [DllImport("kernel32.dll", SetLastError = true)] 21 | public static extern IntPtr FindResource(IntPtr hModule, string lpName, uint lpType); 22 | [DllImport("kernel32.dll", SetLastError = true)] 23 | public static extern IntPtr LoadResource(IntPtr hModule, IntPtr hResInfo); 24 | [DllImport("kernel32.dll", SetLastError = true)] 25 | public static extern IntPtr LockResource(IntPtr hResData); 26 | [DllImport("kernel32.dll", SetLastError = true)] 27 | public static extern uint SizeofResource(IntPtr hModule, IntPtr hResInfo); 28 | [DllImport("kernel32.dll", SetLastError = true)] 29 | public static extern bool FreeLibrary(IntPtr hModule); 30 | 31 | // Constants 32 | public const uint LOAD_LIBRARY_AS_DATAFILE = 0x00000002; 33 | public const uint RT_RCDATA = 10; 34 | } 35 | '@ 36 | } 37 | 38 | $resourceName = "BOOTMGRSECURITYVERSIONNUMBER" 39 | 40 | if (-not (Test-Path $Path -PathType Leaf)) { 41 | Write-Error "File not found at specified path: $Path" 42 | return $null 43 | } 44 | 45 | $hModule = [ResourceHelper]::LoadLibraryEx($Path, [IntPtr]::Zero, [ResourceHelper]::LOAD_LIBRARY_AS_DATAFILE) 46 | if ($hModule -eq [IntPtr]::Zero) { 47 | Write-Error "Failed to load the file as a data file. Win32 Error: $('0x{0:X}' -f [System.Runtime.InteropServices.Marshal]::GetLastWin32Error())" 48 | return $null 49 | } 50 | 51 | try { 52 | $hResInfo = [ResourceHelper]::FindResource($hModule, $resourceName, [ResourceHelper]::RT_RCDATA) 53 | if ($hResInfo -eq [IntPtr]::Zero) { 54 | Write-Error "Resource '$resourceName' not found in the file." 55 | return $null 56 | } 57 | 58 | $hResData = [ResourceHelper]::LoadResource($hModule, $hResInfo) 59 | $pResourceBytes = [ResourceHelper]::LockResource($hResData) 60 | $resourceSize = [ResourceHelper]::SizeofResource($hModule, $hResInfo) 61 | 62 | if ($pResourceBytes -eq [IntPtr]::Zero -or $resourceSize -eq 0) { 63 | Write-Error "Failed to load or lock resource data." 64 | return $null 65 | } 66 | 67 | # Copy the raw bytes without conversion or trimming 68 | $bytes = New-Object byte[] $resourceSize 69 | [System.Runtime.InteropServices.Marshal]::Copy($pResourceBytes, $bytes, 0, $resourceSize) 70 | 71 | # Return the raw byte array 72 | return $bytes 73 | 74 | } finally { 75 | if ($hModule -ne [IntPtr]::Zero) { 76 | [ResourceHelper]::FreeLibrary($hModule) | Out-Null 77 | } 78 | } 79 | } 80 | -------------------------------------------------------------------------------- /ps/Get-PEInfo.ps1: -------------------------------------------------------------------------------- 1 | # Created by github.com/cjee21 2 | # Adapted from code generated by Google Gemini 3 | # License: MIT 4 | 5 | function Get-PEInfo { 6 | [CmdletBinding()] 7 | param( 8 | [Parameter(Mandatory=$true)] 9 | [ValidateScript({Test-Path $_ -PathType Leaf})] 10 | [string]$FilePath 11 | ) 12 | 13 | # Dictionary to translate the numeric Machine value 14 | $MachineMap = @{ 15 | [UInt16]0x014C = "x86" 16 | [UInt16]0x01C0 = "ARM" 17 | [UInt16]0x01C2 = "ARM Thumb" 18 | [UInt16]0x01C4 = "ARM Thumb-2" 19 | [UInt16]0x0EBC = "EFI" 20 | [UInt16]0x8664 = "x64" 21 | [UInt16]0xAA64 = "ARM64" 22 | } 23 | 24 | # Dictionary to translate the numeric Subsystem value 25 | $SubsystemMap = @{ 26 | [UInt16]1 = "Native" 27 | [UInt16]2 = "Windows GUI" 28 | [UInt16]3 = "Windows CUI" 29 | [UInt16]8 = "Native Windows" 30 | [UInt16]9 = "Windows CE GUI" 31 | [UInt16]10 = "EFI Application" 32 | [UInt16]11 = "EFI Boot Service Driver" 33 | [UInt16]12 = "EFI Runtime Driver" 34 | [UInt16]13 = "EFI ROM" 35 | [UInt16]14 = "XBOX" 36 | [UInt16]16 = "Windows Boot Application" 37 | } 38 | 39 | function Goto { 40 | param( 41 | [Parameter(Mandatory=$true)] 42 | [System.IO.FileStream]$FileStream, 43 | [Parameter(Mandatory=$true)] 44 | [Int64]$FileOffset 45 | ) 46 | [void]$FileStream.Seek($FileOffset, [System.IO.SeekOrigin]::Begin) 47 | } 48 | 49 | function Get_L2 { 50 | param( 51 | [Parameter(Mandatory=$true)] 52 | [System.IO.BinaryReader]$BinaryReader 53 | ) 54 | $BinaryReader.ReadUInt16() 55 | } 56 | 57 | function Get_L4 { 58 | param( 59 | [Parameter(Mandatory=$true)] 60 | [System.IO.BinaryReader]$BinaryReader 61 | ) 62 | $BinaryReader.ReadUInt32() 63 | } 64 | 65 | try { 66 | # Open the file stream for reading 67 | $fs = [System.IO.FileStream]::new($FilePath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read) 68 | $br = [System.IO.BinaryReader]::new($fs) 69 | 70 | # Check that it is a MZ/PE 71 | Goto $fs 0x0 72 | $MzSig = Get_L2 $br 73 | if ($MzSig -ne 0x5A4D) { 74 | throw "Not a MZ/PE" 75 | } 76 | 77 | # Get the PE Header offset (e_lfanew) from offset 0x3C 78 | Goto $fs 0x3C 79 | $PeOffset = Get_L4 $br 80 | 81 | # Check that we have PE header 82 | Goto $fs $PeOffset 83 | $PeSig = Get_L4 $br 84 | if ($PeSig -ne 0x00004550) { 85 | throw "Not a PE" 86 | } 87 | 88 | # Get Machine type 89 | $Machine = Get_L2 $br 90 | 91 | # Get Optional Header magic 92 | Goto $fs ($PeOffset + 24) 93 | $OptMagic = Get_L2 $br 94 | if ($OptMagic -ne 0x10B -and $OptMagic -ne 0x20B) { 95 | throw "Unsupported Optional Header" 96 | } 97 | 98 | # Get Subsystem version 99 | Goto $fs ($PeOffset + 24 + 48) 100 | $MajorSubsystemVersion = Get_L2 $br 101 | $MinorSubsystemVersion = Get_L2 $br 102 | $SubsystemVersion = [version]::new($MajorSubsystemVersion, $MinorSubsystemVersion) 103 | 104 | # Get Subsystem 105 | Goto $fs ($PeOffset + 24 + 68) 106 | $Subsystem = Get_L2 $br 107 | 108 | # Output the result 109 | [PSCustomObject]@{ 110 | FilePath = $FilePath 111 | Machine = $MachineMap[$Machine] 112 | Subsystem = $SubsystemMap[$Subsystem] 113 | SubsystemVersion = $SubsystemVersion 114 | } 115 | } 116 | catch { 117 | Write-Error "Error processing file '$FilePath': $($_.Exception.Message)" 118 | } 119 | finally { 120 | # Always close the streams 121 | if ($br) { $br.Dispose() } 122 | if ($fs) { $fs.Dispose() } 123 | } 124 | } 125 | -------------------------------------------------------------------------------- /ps/Get-SBAT.ps1: -------------------------------------------------------------------------------- 1 | # Created by github.com/cjee21 2 | # Adapted from code generated by Google Gemini 3 | # License: MIT 4 | 5 | function Get-SBAT { 6 | [CmdletBinding()] 7 | param( 8 | [Parameter(Mandatory=$true)] 9 | [ValidateScript({Test-Path $_ -PathType Leaf})] 10 | [string]$FilePath 11 | ) 12 | 13 | function Goto { 14 | param( 15 | [Parameter(Mandatory=$true)] 16 | [System.IO.FileStream]$FileStream, 17 | [Parameter(Mandatory=$true)] 18 | [Int64]$FileOffset 19 | ) 20 | [void]$FileStream.Seek($FileOffset, [System.IO.SeekOrigin]::Begin) 21 | } 22 | 23 | function Get_L2 { 24 | param( 25 | [Parameter(Mandatory=$true)] 26 | [System.IO.BinaryReader]$BinaryReader 27 | ) 28 | $BinaryReader.ReadUInt16() 29 | } 30 | 31 | function Get_L4 { 32 | param( 33 | [Parameter(Mandatory=$true)] 34 | [System.IO.BinaryReader]$BinaryReader 35 | ) 36 | $BinaryReader.ReadUInt32() 37 | } 38 | 39 | function Get_L8 { 40 | param( 41 | [Parameter(Mandatory=$true)] 42 | [System.IO.BinaryReader]$BinaryReader 43 | ) 44 | $BinaryReader.ReadUInt64() 45 | } 46 | 47 | try { 48 | # Open the file stream for reading 49 | $fs = [System.IO.FileStream]::new($FilePath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read) 50 | $br = [System.IO.BinaryReader]::new($fs) 51 | 52 | # Check that it is a MZ/PE 53 | Goto $fs 0x0 54 | $MzSig = Get_L2 $br 55 | if ($MzSig -ne 0x5A4D) { 56 | throw "Not a MZ/PE" 57 | } 58 | 59 | # Get the PE Header offset (e_lfanew) from offset 0x3C 60 | Goto $fs 0x3C 61 | $PeOffset = Get_L4 $br 62 | 63 | # Check that we have PE header 64 | Goto $fs $PeOffset 65 | $PeSig = Get_L4 $br 66 | if ($PeSig -ne 0x00004550) { 67 | throw "Not a PE" 68 | } 69 | 70 | # Get Optional Header magic 71 | Goto $fs ($PeOffset + 24) 72 | $OptMagic = Get_L2 $br 73 | if ($OptMagic -ne 0x10B -and $OptMagic -ne 0x20B) { 74 | throw "Unsupported Optional Header" 75 | } 76 | 77 | # Get offset of section headers 78 | if ($OptMagic -eq 0x10B) { 79 | $NumRVAandSizesOffset = $PeOffset + 24 + 72 + 16 + 4 80 | } 81 | if ($OptMagic -eq 0x20B) { 82 | $NumRVAandSizesOffset = $PeOffset + 24 + 72 + 32 + 4 83 | } 84 | Goto $fs $NumRVAandSizesOffset 85 | $NumRVAandSizes = Get_L4 $br 86 | $SectHeadOffset = $NumRVAandSizesOffset + 4 + ($NumRVAandSizes * 8) 87 | 88 | # Find .sbat 89 | Goto $fs ($PeOffset + 4 + 2) 90 | $NumSections = Get_L2 $br 91 | Goto $fs $SectHeadOffset 92 | $sbat_sectionhead_offset = 0 93 | for ($Index = 0; $Index -lt $NumSections; $Index++) { 94 | $SectName = Get_L8 $br 95 | if ($SectName -eq 0x000000746162732E) { 96 | $sbat_sectionhead_offset = $SectHeadOffset + ($Index * 40) 97 | Break 98 | } else { 99 | Goto $fs ($SectHeadOffset + (($Index + 1) * 40)) 100 | } 101 | } 102 | 103 | # If no .sbat section 104 | if ($sbat_sectionhead_offset -eq 0) { 105 | throw ".sbat section not found" 106 | } 107 | 108 | # Get SBAT offset and length 109 | Goto $fs ($sbat_sectionhead_offset + 8) 110 | $SBAT_length = Get_L4 $br 111 | Goto $fs ($sbat_sectionhead_offset + 8 + 4 + 4 + 4) 112 | $SBAT_offset = Get_L4 $br 113 | 114 | # Get SBAT string 115 | Goto $fs $SBAT_offset 116 | $buffer = [byte[]]::new($SBAT_length) 117 | $bytesRead = $fs.Read($buffer, 0, $SBAT_length) 118 | if ($bytesRead -gt 0) { 119 | # Decode the bytes into a UTF-8 string 120 | # Note: We only decode the bytes that were actually read ($bytesRead) 121 | return [System.Text.Encoding]::UTF8.GetString($buffer, 0, $bytesRead) 122 | } 123 | return "" # Return empty string if 0 bytes were read 124 | } 125 | catch { 126 | Write-Error "Error processing file '$FilePath': $($_.Exception.Message)" 127 | } 128 | finally { 129 | # Always close the streams 130 | if ($br) { $br.Dispose() } 131 | if ($fs) { $fs.Dispose() } 132 | } 133 | } 134 | -------------------------------------------------------------------------------- /ps/Check Windows state.ps1: -------------------------------------------------------------------------------- 1 | # Created by github.com/cjee21 2 | # License: MIT 3 | 4 | # Check for admin 5 | Write-Host "Checking for Administrator permission..." 6 | if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { 7 | Write-Warning "Insufficient permissions to run this script. Please run as administrator." 8 | Break 9 | } else { 10 | Write-Host "Running as administrator - continuing execution...`n" 11 | } 12 | 13 | # Print computer info 14 | $v = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' 15 | "Windows version: {0} (Build {1}.{2})`n" -f $v.DisplayVersion, $v.CurrentBuildNumber, $v.UBR 16 | 17 | Write-Host "UEFISecureBootEnabled :" (Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\State).UEFISecureBootEnabled 18 | "AvailableUpdates : 0x{0:X4}" -f (Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot).AvailableUpdates 19 | Write-Host "UEFICA2023Status :" (Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing).UEFICA2023Status 20 | Write-Host "WindowsUEFICA2023Capable : " -NoNewline 21 | switch ((Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing).WindowsUEFICA2023Capable) { 22 | 1 { "Windows UEFI CA 2023 cert is in DB" } 23 | 2 { "Windows UEFI CA 2023 cert is in DB, system is starting from 2023 signed boot manager" } 24 | Default { "Windows UEFI CA 2023 cert is not in DB" } 25 | } 26 | 27 | Write-Host "" 28 | 29 | Import-Module "$PSScriptRoot\Get-BootMgrSecurityVersion.ps1" 30 | 31 | function Get-AuthenticodeSignatureSignerCertificateIssuer { 32 | param( 33 | [Parameter(Mandatory=$true)] 34 | [String]$FilePath 35 | ) 36 | # $bootmgfw_sigCA = (Get-AuthenticodeSignature -FilePath $FilePath).SignerCertificate.Issuer 37 | # Workaround to get actual signature of bootmgfw.efi as it is also catalogue signed and Get-AuthenticodeSignature returns the catalogue signature 38 | # https://github.com/PowerShell/PowerShell/issues/23820 39 | $cert = [System.Security.Cryptography.X509Certificates.X509Certificate]::CreateFromSignedFile($FilePath) 40 | [System.Security.Cryptography.X509Certificates.X509Certificate2]::new($cert).Issuer 41 | } 42 | 43 | function Get-SVNfromBytes { 44 | param( 45 | [Parameter(Mandatory=$true)] 46 | [System.Array]$SVN_bytes 47 | ) 48 | $MinorBytes = $SVN_bytes[0..1] 49 | $svn_ver_minor = [System.BitConverter]::ToInt16($MinorBytes, 0) 50 | $MajorBytes = $SVN_bytes[2..3] 51 | $svn_ver_major = [System.BitConverter]::ToInt16($MajorBytes, 0) 52 | [version]::new($svn_ver_major, $svn_ver_minor) 53 | } 54 | 55 | mountvol s: /s 56 | 57 | $bootmgfw_verinfo = (Get-Item -Path S:\EFI\Microsoft\Boot\bootmgfw.efi).VersionInfo 58 | $bootmgfw_sigCA = Get-AuthenticodeSignatureSignerCertificateIssuer 'S:\EFI\Microsoft\Boot\bootmgfw.efi' 59 | $bootmgfw_SVN_bytes = Get-BootMgrSecurityVersionBytes -Path S:\EFI\Microsoft\Boot\bootmgfw.efi 60 | 61 | $bootmgr_verinfo = (Get-Item -Path S:\EFI\Microsoft\Boot\bootmgr.efi).VersionInfo 62 | $bootmgr_sigCA = Get-AuthenticodeSignatureSignerCertificateIssuer 'S:\EFI\Microsoft\Boot\bootmgr.efi' 63 | $bootmgr_SVN_bytes = Get-BootMgrSecurityVersionBytes -Path S:\EFI\Microsoft\Boot\bootmgr.efi 64 | 65 | $memtest_verinfo = (Get-Item -Path S:\EFI\Microsoft\Boot\memtest.efi).VersionInfo 66 | $memtest_sigCA = Get-AuthenticodeSignatureSignerCertificateIssuer 'S:\EFI\Microsoft\Boot\memtest.efi' 67 | 68 | mountvol s: /d 69 | 70 | $bootmgfw_ver = $bootmgfw_verinfo.FileVersion 71 | Write-Host "bootmgfw version : $bootmgfw_ver" 72 | $bootmgfw_sigCA_name = [regex]::Match($bootmgfw_sigCA, 'CN=([^,]+)').Groups[1].Value 73 | Write-Host "bootmgfw signature CA : $bootmgfw_sigCA_name" 74 | $bootmgfw_svn_ver = Get-SVNfromBytes $bootmgfw_SVN_bytes 75 | Write-Host "bootmgfw SVN : $bootmgfw_svn_ver" 76 | 77 | Write-Host "" 78 | 79 | $bootmgr_ver = $bootmgr_verinfo.FileVersion 80 | Write-Host "bootmgr version : $bootmgr_ver" 81 | $bootmgr_sigCA_name = [regex]::Match($bootmgr_sigCA, 'CN=([^,]+)').Groups[1].Value 82 | Write-Host "bootmgr signature CA : $bootmgr_sigCA_name" 83 | $bootmgr_svn_ver = Get-SVNfromBytes $bootmgr_SVN_bytes 84 | Write-Host "bootmgr SVN : $bootmgr_svn_ver" 85 | 86 | Write-Host "" 87 | 88 | $memtest_ver = $memtest_verinfo.FileVersion 89 | Write-Host "memtest version : $memtest_ver" 90 | $memtest_sigCA_name = [regex]::Match($memtest_sigCA, 'CN=([^,]+)').Groups[1].Value 91 | Write-Host "memtest signature CA : $memtest_sigCA_name" 92 | -------------------------------------------------------------------------------- /ps/Get-UEFIDatabaseSignatures.ps1: -------------------------------------------------------------------------------- 1 | # From https://gist.github.com/out0xb2/f8e0bae94214889a89ac67fceb37f8c0?permalink_comment_id=4572467#gistcomment-4572467 2 | 3 | function Get-UefiDatabaseSignatures { 4 | <# 5 | .SYNOPSIS 6 | Parses UEFI Signature Databases into logical Powershell objects 7 | .DESCRIPTION 8 | Original Author: Matthew Graeber (@mattifestation) 9 | Modified By: Jeremiah Cox (@int0x6) 10 | Modified By: Joel Roth (@nafai) 11 | Additional Source: https://gist.github.com/mattifestation/991a0bea355ec1dc19402cef1b0e3b6f 12 | Additional Source: https://www.powershellgallery.com/packages/SplitDbxContent/1.0 13 | License: BSD 3-Clause 14 | .PARAMETER Variable 15 | Specifies a UEFI variable, an instance of which is returned by calling the Get-SecureBootUEFI cmdlet. Only 'db' and 'dbx' are supported. 16 | .PARAMETER BytesIn 17 | Specifies a byte array consisting of the PK, KEK, db, or dbx UEFI vairable contents. 18 | .EXAMPLE 19 | $DbxBytes = [IO.File]::ReadAllBytes('.\dbx.bin') 20 | Get-UEFIDatabaseSignatures -BytesIn $DbxBytes 21 | .EXAMPLE 22 | Get-UEFIDatabaseSignatures -Filename ".\DBXUpdate-20230314.x64.bin" 23 | .EXAMPLE 24 | Get-SecureBootUEFI -Name db | Get-UEFIDatabaseSignatures 25 | .EXAMPLE 26 | Get-SecureBootUEFI -Name dbx | Get-UEFIDatabaseSignatures 27 | .EXAMPLE 28 | Get-SecureBootUEFI -Name pk | Get-UEFIDatabaseSignatures 29 | .EXAMPLE 30 | Get-SecureBootUEFI -Name kek | Get-UEFIDatabaseSignatures 31 | .INPUTS 32 | Microsoft.SecureBoot.Commands.UEFIEnvironmentVariable 33 | Accepts the output of Get-SecureBootUEFI over the pipeline. 34 | .OUTPUTS 35 | UefiSignatureDatabase 36 | Outputs an array of custom powershell objects describing a UEFI Signature Database. "77fa9abd-0359-4d32-bd60-28f4e78f784b" refers to Microsoft as the owner. 37 | #> 38 | 39 | [CmdletBinding()] 40 | param ( 41 | [Parameter(Mandatory, ValueFromPipeline, ParameterSetName = 'UEFIVariable')] 42 | [ValidateScript({ ($_.GetType().Fullname -eq 'Microsoft.SecureBoot.Commands.UEFIEnvironmentVariable') -and ($_.Name -in "kek","pk","db","dbx","kekdefault","pkdefault","dbdefault","dbxdefault") })] 43 | $Variable, 44 | 45 | [Parameter(Mandatory, ParameterSetName = 'ByteArray')] 46 | [Byte[]] 47 | [ValidateNotNullOrEmpty()] 48 | $BytesIn, 49 | 50 | [Parameter(Mandatory, ParameterSetName = 'File')] 51 | [string] 52 | [ValidateScript({ (Resolve-Path "$_").where({Test-Path $_}).Path })] 53 | $Filename 54 | ) 55 | 56 | $SignatureTypeMapping = @{ 57 | 'C1C41626-504C-4092-ACA9-41F936934328' = 'EFI_CERT_SHA256_GUID' # Most often used for dbx 58 | 'A5C059A1-94E4-4AA7-87B5-AB155C2BF072' = 'EFI_CERT_X509_GUID' # Most often used for db 59 | } 60 | 61 | $Bytes = $null 62 | 63 | if ($Filename) 64 | { 65 | $Bytes = Get-Content -Encoding Byte $Filename -ErrorAction Stop 66 | } 67 | elseif ($Variable) 68 | { 69 | $Bytes = $Variable.Bytes 70 | } 71 | else 72 | { 73 | $Bytes = $BytesIn 74 | } 75 | 76 | # Modified from Split-Dbx 77 | if (($Bytes[40] -eq 0x30) -and ($Bytes[41] -eq 0x82 )) 78 | { 79 | Write-Debug "Removing signature." 80 | 81 | # Signature is known to be ASN size plus header of 4 bytes 82 | $sig_length = $Bytes[42] * 256 + $Bytes[43] + 4 83 | if ($sig_length -gt ($Bytes.Length + 40)) { 84 | Write-Error "Signature longer than file size!" -ErrorAction Stop 85 | } 86 | 87 | ## Unsigned db store 88 | [System.Byte[]]$Bytes = @($Bytes[($sig_length+40)..($Bytes.Length - 1)].Clone()) 89 | } 90 | else 91 | { 92 | Write-Debug "Signature not found. Assuming it's already split." 93 | } 94 | 95 | try 96 | { 97 | $MemoryStream = New-Object -TypeName IO.MemoryStream -ArgumentList @(,$Bytes) 98 | $BinaryReader = New-Object -TypeName IO.BinaryReader -ArgumentList $MemoryStream, ([Text.Encoding]::Unicode) 99 | } 100 | catch 101 | { 102 | throw $_ 103 | return 104 | } 105 | 106 | # What follows will be an array of EFI_SIGNATURE_LIST structs 107 | 108 | while ($BinaryReader.PeekChar() -ne -1) { 109 | $SignatureType = $SignatureTypeMapping[([Guid][Byte[]] $BinaryReader.ReadBytes(16)).Guid] 110 | $SignatureListSize = $BinaryReader.ReadUInt32() 111 | $SignatureHeaderSize = $BinaryReader.ReadUInt32() 112 | $SignatureSize = $BinaryReader.ReadUInt32() 113 | 114 | $SignatureHeader = $BinaryReader.ReadBytes($SignatureHeaderSize) 115 | 116 | # 0x1C is the size of the EFI_SIGNATURE_LIST header 117 | $SignatureCount = ($SignatureListSize - 0x1C) / $SignatureSize 118 | 119 | $SignatureList = 1..$SignatureCount | ForEach-Object { 120 | $SignatureDataBytes = $BinaryReader.ReadBytes($SignatureSize) 121 | 122 | $SignatureOwner = [Guid][Byte[]] $SignatureDataBytes[0..15] 123 | 124 | switch ($SignatureType) { 125 | 'EFI_CERT_SHA256_GUID' { 126 | $SignatureData = ([Byte[]] $SignatureDataBytes[0x10..0x2F] | ForEach-Object { $_.ToString('X2') }) -join '' 127 | } 128 | 129 | 'EFI_CERT_X509_GUID' { 130 | $SignatureData = New-Object Security.Cryptography.X509Certificates.X509Certificate2 -ArgumentList @(,([Byte[]] $SignatureDataBytes[16..($SignatureDataBytes.Count - 1)])) 131 | } 132 | } 133 | 134 | [PSCustomObject] @{ 135 | PSTypeName = 'EFI.SignatureData' 136 | SignatureOwner = $SignatureOwner 137 | SignatureData = $SignatureData 138 | } 139 | } 140 | 141 | [PSCustomObject] @{ 142 | PSTypeName = 'EFI.SignatureList' 143 | SignatureType = $SignatureType 144 | SignatureList = $SignatureList 145 | } 146 | } 147 | } 148 | -------------------------------------------------------------------------------- /ps/Check UEFI PK, KEK, DB and DBX.ps1: -------------------------------------------------------------------------------- 1 | # Created by github.com/cjee21 2 | # License: MIT 3 | # Repository: https://github.com/cjee21/Check-UEFISecureBootVariables 4 | 5 | # Check for admin 6 | Write-Host "Checking for Administrator permission..." 7 | if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { 8 | Write-Warning "Insufficient permissions to run this script. Please run as administrator." 9 | Break 10 | } else { 11 | Write-Host "Running as administrator - continuing execution...`n" 12 | } 13 | 14 | # Check files 15 | if (-not ((Test-Path -Path "$PSScriptRoot\Check-Dbx-Simplified.ps1" -PathType Leaf) -and ` 16 | (Test-Path -Path "$PSScriptRoot\Get-UEFIDatabaseSignatures.ps1" -PathType Leaf) -and ` 17 | (Test-Path -Path "$PSScriptRoot\..\dbx_bin\*.bin") -and ` 18 | (Test-Path -Path "$PSScriptRoot\..\dbx_info\*.json"))) { 19 | Write-Warning "Some required files are missing. Please re-obtain a copy from https://github.com/cjee21/Check-UEFISecureBootVariables." 20 | Break 21 | } 22 | 23 | # Print computer info 24 | Get-Date -Format 'dd MMMM yyyy' 25 | $computer = Get-WmiObject Win32_ComputerSystem 26 | $bios = Get-WmiObject Win32_BIOS 27 | "Manufacturer: " + $computer.Manufacturer 28 | "Model: " + $computer.Model 29 | $biosinfo = $bios.Manufacturer , $bios.Name , $bios.SMBIOSBIOSVersion , $bios.Version -join ", " 30 | "BIOS: " + $biosinfo 31 | $v = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' 32 | "Windows version: {0} (Build {1}.{2})`n" -f $v.DisplayVersion, $v.CurrentBuildNumber, $v.UBR 33 | 34 | # Check for Secure Boot status 35 | Write-Host "Secure Boot status: " -NoNewLine 36 | try { 37 | $status = Confirm-SecureBootUEFI -ErrorAction Stop 38 | if ($status -eq $True) { 39 | Write-Host "$([char]0x1b)[92mEnabled$([char]0x1b)[0m`n" 40 | } 41 | elseif ($status -eq $False) { 42 | Write-Host "$([char]0x1b)[91mDisabled$([char]0x1b)[0m`n" 43 | } 44 | } 45 | catch [System.PlatformNotSupportedException] { 46 | Write-Host "$([char]0x1b)[91mNot available$([char]0x1b)[0m`n" 47 | Break 48 | } 49 | catch { 50 | Write-Host "$([char]0x1b)[91mUnknown$([char]0x1b)[0m`n" 51 | Break 52 | } 53 | 54 | $bold = "$([char]0x1b)[1m" 55 | $reset = "$([char]0x1b)[0m" 56 | $check = "$([char]0x1b)[92m$([char]8730)$reset" 57 | $cross = "$([char]0x1b)[91mX$reset" 58 | 59 | # Check whether it is ARM architecture 60 | $IsArm = $false 61 | try { 62 | $arch = (Get-WmiObject Win32_Processor -ErrorAction Stop).Architecture 63 | # 0 = x86, 9 = x64, 5 = ARM, 12 = ARM64 64 | if ($arch -eq 5 -or $arch -eq 12) { 65 | $IsArm = $true 66 | Write-Host "Detected Windows on ARM architecture!`n" 67 | } 68 | } catch { 69 | Write-Warning "Unable to determine CPU architecture, proceeding with defaults (x64).`n" 70 | } 71 | 72 | Import-Module "$PSScriptRoot\Get-UEFIDatabaseSignatures.ps1" 73 | 74 | Write-Host $bold'Current UEFI PK'$reset 75 | try { 76 | $pk = Get-SecureBootUEFI -Name pk | Get-UEFIDatabaseSignatures 77 | $pk.SignatureList.SignatureData.Subject | ForEach-Object { 78 | $pk_name = [regex]::Match($_, 'CN=([^,]+)').Groups[1].Value 79 | Write-Host "$check $pk_name" 80 | } 81 | } catch { 82 | Write-Warning "Failed to query UEFI variable PK" 83 | } 84 | 85 | Write-Host "" 86 | Write-Host $bold'Default UEFI PK'$reset 87 | if ($IsArm) { 88 | Write-Warning "Some ARM-based Windows devices can't retrieve default UEFI variables." 89 | } 90 | try { 91 | $pk_default = Get-SecureBootUEFI -Name PKDefault | Get-UEFIDatabaseSignatures 92 | $pk_default.SignatureList.SignatureData.Subject | ForEach-Object { 93 | $pk_name = [regex]::Match($_, 'CN=([^,]+)').Groups[1].Value 94 | Write-Host "$check $pk_name" 95 | } 96 | } catch { 97 | Write-Warning "Failed to query UEFI variable PKDefault" 98 | } 99 | 100 | function Show-UEFICertIsPresent { 101 | param ( 102 | [Parameter(Mandatory)] 103 | [string]$SecureBootUEFIVar, 104 | [Parameter(Mandatory)] 105 | [string]$CertName 106 | ) 107 | try { 108 | if ([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI $SecureBootUEFIVar -ErrorAction Stop).bytes) -match $CertName) { 109 | $revoked = $false 110 | try { 111 | $revoked = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbx -ErrorAction Stop).bytes) -match $CertName 112 | } catch { 113 | $revoked = $false 114 | } 115 | Write-Host "$check $CertName (revoked: $revoked)" 116 | } else { 117 | Write-Host "$cross $CertName" 118 | } 119 | } catch { 120 | Write-Warning "Failed to query UEFI variable '$SecureBootUEFIVar' for cert '$CertName'" 121 | } 122 | } 123 | 124 | function Show-UEFICertOthers { 125 | param ( 126 | [Parameter(Mandatory)] 127 | [string]$SecureBootUEFIVar, 128 | [Parameter(Mandatory)] 129 | [Array]$KnownCerts 130 | ) 131 | try { 132 | $certs = Get-SecureBootUEFI -Name $SecureBootUEFIVar | Get-UEFIDatabaseSignatures 133 | $cert_names = @() 134 | $certs.SignatureList.SignatureData.Subject | ForEach-Object { 135 | $cert_names += [regex]::Match($_, 'CN=([^,]+)').Groups[1].Value 136 | } 137 | $cert_names | ForEach-Object { 138 | if ($KnownCerts -notcontains $_) { 139 | $revoked = $false 140 | try { 141 | $revoked = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbx -ErrorAction Stop).bytes) -match $_ 142 | } catch { 143 | $revoked = $false 144 | } 145 | Write-Host "$check $_ (revoked: $revoked)" 146 | } 147 | } 148 | } catch { 149 | Write-Warning "Failed to query UEFI variable '$SecureBootUEFIVar'" 150 | } 151 | } 152 | 153 | $KEKCerts = @( 154 | 'Microsoft Corporation KEK CA 2011' 155 | 'Microsoft Corporation KEK 2K CA 2023' 156 | ) 157 | 158 | Write-Host "" 159 | Write-Host $bold'Current UEFI KEK'$reset 160 | $KEKCerts | ForEach-Object { 161 | Show-UEFICertIsPresent -SecureBootUEFIVar kek -CertName $_ 162 | } 163 | Show-UEFICertOthers -SecureBootUEFIVar kek -KnownCerts $KEKCerts 164 | 165 | Write-Host "" 166 | Write-Host $bold'Default UEFI KEK'$reset 167 | if ($IsArm) { 168 | Write-Warning "Some ARM-based Windows devices can't retrieve default UEFI variables." 169 | } 170 | $KEKCerts | ForEach-Object { 171 | Show-UEFICertIsPresent -SecureBootUEFIVar KEKDefault -CertName $_ 172 | } 173 | Show-UEFICertOthers -SecureBootUEFIVar KEKDefault -KnownCerts $KEKCerts 174 | 175 | $DBCerts = @( 176 | 'Microsoft Windows Production PCA 2011' 177 | 'Microsoft Corporation UEFI CA 2011' 178 | 'Windows UEFI CA 2023' 179 | 'Microsoft UEFI CA 2023' 180 | 'Microsoft Option ROM UEFI CA 2023' 181 | ) 182 | 183 | Write-Host "" 184 | Write-Host $bold'Current UEFI DB'$reset 185 | $DBCerts | ForEach-Object { 186 | Show-UEFICertIsPresent -SecureBootUEFIVar db -CertName $_ 187 | } 188 | Show-UEFICertOthers -SecureBootUEFIVar db -KnownCerts $DBCerts 189 | 190 | Write-Host "" 191 | Write-Host $bold'Default UEFI DB'$reset 192 | if ($IsArm) { 193 | Write-Warning "Some ARM-based Windows devices can't retrieve default UEFI variables." 194 | } 195 | $DBCerts | ForEach-Object { 196 | Show-UEFICertIsPresent -SecureBootUEFIVar dbDefault -CertName $_ 197 | } 198 | Show-UEFICertOthers -SecureBootUEFIVar DBDefault -KnownCerts $DBCerts 199 | 200 | Write-Host "" 201 | Write-Host $bold'Current UEFI DBX'$reset 202 | 203 | function Show-CheckDBX { 204 | param( 205 | [Parameter(Mandatory)][string]$Label, 206 | [Parameter(Mandatory)][string]$File 207 | ) 208 | Write-Host "$Label : " -NoNewline 209 | try { 210 | $oldPreference = $ErrorActionPreference 211 | $ErrorActionPreference = 'Stop' 212 | & "$PSScriptRoot\Check-Dbx-Simplified.ps1" "$File" 213 | $ErrorActionPreference = $oldPreference 214 | } catch { 215 | Write-Host "ERROR: An exception has occurred while checking DBX" -ForegroundColor Red 216 | } 217 | } 218 | 219 | if ($IsArm) { 220 | Show-CheckDBX "2025-02-25 (v1.4.0)" "$PSScriptRoot\..\dbx_bin\arm64_DBXUpdate_2025-02-25.bin" 221 | } else { 222 | # Show-CheckDBX "2023-03-14 " "$PSScriptRoot\..\dbx_bin\x64_DBXUpdate_2023-03-14.bin" 223 | # Show-CheckDBX "2023-05-09 " "$PSScriptRoot\..\dbx_bin\x64_DBXUpdate_2023-05-09.bin" 224 | # Show-CheckDBX "2025-01-14 (v1.3.1)" "$PSScriptRoot\..\dbx_bin\x64_DBXUpdate_2025-01-14.bin" 225 | # Show-CheckDBX "2025-06-11 (v1.5.1)" "$PSScriptRoot\..\dbx_bin\x64_DBXUpdate_2025-06-11.bin" 226 | Show-CheckDBX "2025-10-14 (v1.6.0)" "$PSScriptRoot\..\dbx_bin\x64_DBXUpdate_2025-10-14.bin" 227 | } 228 | 229 | $latest_svn = "10_14_25" 230 | $svn_json = Get-Content -Path "$PSScriptRoot\..\dbx_info\dbx_info_msft_$latest_svn.json" -Raw | ConvertFrom-Json 231 | $svn_bootmgr_latest = [version]($svn_json.svns | Where-Object { $_.guid -eq "{9d132b61-59d5-4388-1cab-185c3cb2eb92} == EFI_BOOTMGR_DBXSVN_GUID" }).version 232 | $svn_cdboot_latest = [version]($svn_json.svns | Where-Object { $_.guid -eq "{e8f82e9d-e127-4158-88a4-4c18abe2f284} == EFI_CDBOOT_DBXSVN_GUID" }).version 233 | $svn_wdsmgfw_latest = [version]($svn_json.svns | Where-Object { $_.guid -eq "{c999cac2-7ffe-496f-2781-9e2a8a535976} == EFI_WDSMGR_DBXSVN_GUID" }).version 234 | $dbx_bytes = (Get-SecureBootUEFI dbx).Bytes 235 | $dbx_hex = ($dbx_bytes | ForEach-Object {'{0:x2}' -f $_}) -join '' 236 | 237 | function Get-VersionFromHexString { 238 | # SVN_DATA value: 239 | # Byte[0] is the UINT8 version of the SVN_DATA structure. 240 | # Bytes[1...16] are the GUID of the application being revoked. Little endian. 241 | # Bytes[17...18] are the Minor SVN number. Litte endian UINT16. 242 | # Bytes[19...20] are the Major SVN number. Litte endian UINT16. 243 | # Bytes[21...31] are 11 zero bytes padding. 244 | [CmdletBinding()] 245 | param( 246 | [Parameter(Mandatory=$true)] 247 | [ValidateNotNullOrEmpty()] 248 | [string]$HexString 249 | ) 250 | $byteArray = -split ($HexString -replace '..', '$& ') | ForEach-Object { 251 | [System.Convert]::ToByte($_, 16) 252 | } 253 | $MinorBytes = $byteArray[17..18] 254 | $svn_ver_minor = [System.BitConverter]::ToInt16($MinorBytes, 0) 255 | $MajorBytes = $byteArray[19..20] 256 | $svn_ver_major = [System.BitConverter]::ToInt16($MajorBytes, 0) 257 | return [version]::new($svn_ver_major, $svn_ver_minor) 258 | } 259 | 260 | Write-Host "Windows Bootmgr SVN : " -NoNewline 261 | $svn_bootmgr = [Regex]::Matches($dbx_hex,'01612B139DD5598843AB1C185C3CB2EB92........0000000000000000000000', [System.Text.RegularExpressions.RegexOptions]::IgnoreCase).Value 262 | 263 | if ($svn_bootmgr.Count) { 264 | $svn_bootmgr_vers = $svn_bootmgr | ForEach-Object { 265 | Get-VersionFromHexString($_) 266 | } 267 | $svn_bootmgr_ver = ($svn_bootmgr_vers | Measure-Object -Maximum).Maximum 268 | if ($svn_bootmgr_ver -ge $svn_bootmgr_latest) { 269 | Write-Host $svn_bootmgr_ver -ForegroundColor Green 270 | } else { 271 | Write-Host $svn_bootmgr_ver -ForegroundColor Red 272 | } 273 | } else { 274 | Write-Host 'None' -ForegroundColor Red 275 | } 276 | Write-Host "Windows cdboot SVN : " -NoNewline 277 | $svn_cdboot = [Regex]::Matches($dbx_hex,'019D2EF8E827E15841A4884C18ABE2F284........0000000000000000000000', [System.Text.RegularExpressions.RegexOptions]::IgnoreCase).Value 278 | if ($svn_cdboot.Count) { 279 | $svn_cdboot_vers = $svn_cdboot | ForEach-Object { 280 | Get-VersionFromHexString($_) 281 | } 282 | $svn_cdboot_ver = ($svn_cdboot_vers | Measure-Object -Maximum).Maximum 283 | if ($svn_cdboot_ver -ge $svn_cdboot_latest) { 284 | Write-Host $svn_cdboot_ver -ForegroundColor Green 285 | } else { 286 | Write-Host $svn_cdboot_ver -ForegroundColor Red 287 | } 288 | } else { 289 | Write-Host 'None' -ForegroundColor Red 290 | } 291 | Write-Host "Windows wdsmgfw SVN : " -NoNewline 292 | $svn_wdsmgfw = [Regex]::Matches($dbx_hex,'01C2CA99C9FE7F6F4981279E2A8A535976........0000000000000000000000', [System.Text.RegularExpressions.RegexOptions]::IgnoreCase).Value 293 | if ($svn_wdsmgfw.Count) { 294 | $svn_wdsmgfw_vers = $svn_wdsmgfw | ForEach-Object { 295 | Get-VersionFromHexString($_) 296 | } 297 | $svn_wdsmgfw_ver = ($svn_wdsmgfw_vers | Measure-Object -Maximum).Maximum 298 | if ($svn_wdsmgfw_ver -ge $svn_wdsmgfw_latest) { 299 | Write-Host $svn_wdsmgfw_ver -ForegroundColor Green 300 | } else { 301 | Write-Host $svn_wdsmgfw_ver -ForegroundColor Red 302 | } 303 | } else { 304 | Write-Host 'None' -ForegroundColor Red 305 | } 306 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Check-UEFISecureBootVariables 2 | 3 | PowerShell scripts to check the UEFI KEK, DB and DBX Secure Boot variables as well as scripts for other Secure Boot related items. 4 | 5 | > [!IMPORTANT] 6 | > The DBX checking in `Check UEFI PK, KEK, DB and DBX` is made for x64 and arm64 systems. If you are using an x86 or arm system, it is necessary to replace the `*.bin` files with ones for your system architecture and edit their filenames in the PowerShell script (`Check UEFI PK, KEK, DB and DBX.ps1`) accordingly. The `*.bin` files for various architectures can be obtained from [github.com/microsoft/secureboot_objects](https://github.com/microsoft/secureboot_objects/tree/main/PostSignedObjects/DBX). 7 | 8 | > [!WARNING] 9 | > Disabling Secure Boot should be avoided. If Windows is booted when Secure Boot is turned off, all the Secure Boot and UEFI-related configurations are reset. This may include the deletion of UEFI variables for LSA protection, SkuSiPolicy.p7b and SBAT, requiring them to be set/updated again. 10 | 11 | ## Before using 12 | 13 | Obtain a copy of the contents of this repository from https://github.com/cjee21/Check-UEFISecureBootVariables/archive/refs/heads/main.zip and extract all contents from the ZIP file. 14 | 15 | Alternatively, using Git, clone this repository with the following command: 16 | 17 | ``` 18 | git clone https://github.com/cjee21/Check-UEFISecureBootVariables.git 19 | ``` 20 | 21 | If using Git, the cloned copy can be updated by running the following commands while in `Check-UEFISecureBootVariables` folder. 22 | 23 | ``` 24 | git fetch 25 | git reset --hard origin/main 26 | ``` 27 | 28 | ## Checking the KEK, DB and DBX variables 29 | 30 | Right-click `Check UEFI PK, KEK, DB and DBX.cmd` and *Run as administrator*. 31 | 32 | Example output: 33 | 34 | Screenshot 35 | 36 | ## Re-applying the Secure Boot DBX updates 37 | 38 | If the Secure Boot variables were accidentally reset to default in the UEFI/BIOS settings for example, it is possible to make Windows re-apply the DBX updates that Windows had previously applied. Right-click `Apply DBX update.cmd` and *Run as administrator*. Wait for awhile. The DBX updates should be applied after that. 39 | 40 | ## Deploying all the 2023 certificates as well updating to the 2023 CA signed Boot Manager 41 | 42 | Right-click `Apply DBX update.cmd` and *Run as administrator*. Wait for a while. The Windows UEFI CA 2023 cert and Microsoft Corporation KEK 2K CA 2023 cert will be applied to DB and KEK respectively. The Microsoft Option ROM UEFI CA 2023 and Microsoft UEFI CA 2023 certs will also be applied to the DB if the Microsoft Corporation UEFI CA 2011 cert is present there. It may be needed to restart Windows and run `Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"` to complete the Boot Manager update. 43 | 44 | ## Revoking Windows Production PCA 2011 as well as updating the DBX, SVN and SBAT 45 | 46 | Right-click `Apply revocations.cmd` and *Run as administrator*. Wait for awhile. The DBX should be updated and the Windows Production PCA 2011 cert added to it. The latest SVN will be written to the DBX as well. The SBAT will be written to the 605DAB50-E046-4300-ABB6-3DD810DD8B23:SbatLevel UEFI variable when Windows is restarted. SbatLevel is a Boot Services variable that cannot be checked from within Windows. 47 | 48 | > [!IMPORTANT] 49 | > Make sure you know what you are doing before attempting this. It may cause some things to be no longer bootable on your system. 50 | 51 | ## Registry bits for applying Secure Boot updates 52 | 53 | The bits in `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates` DWORD control what updates are to be applied by Windows. The updates are applied with `Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"` which normally also automatically runs every 12 hours. 54 | 55 | The following are the possible bit values that are currently known. 56 | 57 | | Bit | Usage | 58 | | - | - | 59 | | 0x0002 | Apply DBX updates. | 60 | | 0x0004 | Apply the Microsoft Corporation KEK 2K CA 2023 to the KEK. | 61 | | 0x0020 | Apply Microsoft-signed revocation policy (SkuSiPolicy.p7b) | 62 | | 0x0040 | Apply the Windows UEFI CA 2023 to the DB. | 63 | | 0x0080 | Apply the Windows Production PCA 2011 to the DBX. | 64 | | 0x0100 | Apply the boot manager, signed by the Windows UEFI CA 2023, to the boot partition. | 65 | | 0x0200 | Apply Secure Version Number (SVN) update to the firmware. | 66 | | 0x0400 | Apply Secure Boot Advanced Targeting ([SBAT](https://github.com/rhboot/shim/blob/main/SBAT.md)) update to the firmware. | 67 | | 0x0800 | Apply the Microsoft Option ROM UEFI CA 2023 to the DB. | 68 | | 0x1000 | Apply the Microsoft UEFI CA 2023 to the DB. | 69 | | 0x4000 | This bit modifies the behavior of the 0x0800 and 0x1000 bits to only apply the Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 if the DB already has the Microsoft Corporation UEFI CA 2011. | 70 | 71 | > [!IMPORTANT] 72 | > Please carefully read and understand [How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932](https://support.microsoft.com/en-us/topic/how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d), [Secure Boot Certificate updates: Guidance for IT professionals and organizations](https://support.microsoft.com/en-us/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f) as well as [Registry key updates for Secure Boot: Windows devices with IT-managed updates](https://support.microsoft.com/en-us/topic/registry-key-updates-for-secure-boot-windows-devices-with-it-managed-updates-a7be69c9-4634-42e1-9ca1-df06f43f360d) before attempting to manually modify the registry to apply updates. It is also recommended to read the other resources listed above these in the references section. 73 | 74 | ## Viewing Secure Boot DB and DBX variable update events 75 | 76 | Double-click `Show Secure Boot update events.cmd` to display all the Secure Boot DB and DBX variable update events. Refer to [KB5016061](https://support.microsoft.com/en-gb/topic/kb5016061-secure-boot-db-and-dbx-variable-update-events-37e47cf8-608b-4a87-8175-bdead630eb69) for details on interpreting the events. 77 | 78 | ## Viewing Windows Secure Boot state 79 | 80 | To view the current Windows Secure Boot state, right-click `Check Windows state.cmd` and *Run as administrator*. The output will be similar to the following: 81 | 82 | ``` 83 | Checking for Administrator permission... 84 | Running as administrator - continuing execution... 85 | 86 | Windows version: 25H2 (Build 26200.7462) 87 | 88 | UEFISecureBootEnabled : 1 89 | AvailableUpdates : 0x0000 90 | UEFICA2023Status : NotStarted 91 | WindowsUEFICA2023Capable : Windows UEFI CA 2023 cert is in DB, system is starting from 2023 signed boot manager 92 | 93 | bootmgfw version : 10.0.26100.30227 (WinBuild.160101.0800) 94 | bootmgfw signature CA : Windows UEFI CA 2023 95 | bootmgfw SVN : 7.0 96 | 97 | bootmgr version : 10.0.26100.30227 (WinBuild.160101.0800) 98 | bootmgr signature CA : Microsoft Windows Production PCA 2011 99 | bootmgr SVN : 7.0 100 | 101 | memtest version : 10.0.26100.1 (WinBuild.160101.0800) 102 | memtest signature CA : Microsoft Windows Production PCA 2011 103 | 104 | Press any key to continue . . . 105 | ``` 106 | 107 | ## Viewing all the UEFI Secure Boot variables 108 | 109 | To display all the UEFI Secure Boot variables in readable format, right-click `Show UEFI PK, KEK, DB and DBX.cmd` and *Run as administrator*. All certificates in the PK, KEK and DB variables as well as all hashes in the DBX variable will be displayed. 110 | 111 | ## Checking EFI files 112 | 113 | `Check EFI file info.cmd` can be used to check and display various information of EFI and EXE files. A file path can be passed to it via CLI, a file can be dropped on it or a path may be provided to it when prompted. It can be used to check bootable media for example. Various information will be displayed as in the example below: 114 | 115 | ``` 116 | Path to EFI file: D:\efi\boot\bootx64.efi 117 | 118 | 119 | FilePath : D:\efi\boot\bootx64.efi 120 | Machine : x64 121 | Subsystem : EFI Application 122 | SubsystemVersion : 1.0 123 | 124 | 125 | 126 | File Information: 127 | 128 | 129 | OriginalFilename : bootmgr.exe 130 | FileDescription : Boot Manager 131 | ProductName : Microsoft® Windows® Operating System 132 | Comments : 133 | CompanyName : Microsoft Corporation 134 | FileName : D:\efi\boot\bootx64.efi 135 | FileVersion : 10.0.26100.30227 (WinBuild.160101.0800) 136 | ProductVersion : 10.0.26100.30227 137 | IsDebug : False 138 | IsPatched : False 139 | IsPreRelease : False 140 | IsPrivateBuild : False 141 | IsSpecialBuild : False 142 | Language : English (United States) 143 | LegalCopyright : © Microsoft Corporation. All rights reserved. 144 | LegalTrademarks : 145 | PrivateBuild : 146 | SpecialBuild : 147 | FileVersionRaw : 10.0.26100.30227 148 | ProductVersionRaw : 10.0.26100.30227 149 | 150 | 151 | 152 | Signature Certificate: 153 | 154 | 155 | Subject : CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 156 | Issuer : CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 157 | Thumbprint : FACDE3D80E99AFCC15E08AC5A69BD22785287F79 158 | FriendlyName : 159 | NotBefore : 20/6/2025 2:11:43 AM 160 | NotAfter : 18/6/2026 2:11:43 AM 161 | Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, 162 | System.Security.Cryptography.Oid...} 163 | 164 | 165 | 166 | BOOTMGRSECURITYVERSIONNUMBER: 7.0 167 | 168 | 169 | 170 | Press any key to continue . . . 171 | ``` 172 | 173 | ## References 174 | 175 | - [Windows Secure Boot Key Creation and Management Guidance](https://learn.microsoft.com/en-my/windows-hardware/manufacture/desktop/windows-secure-boot-key-creation-and-management-guidance?view=windows-11) 176 | - [Get-SecureBootUEFI](https://learn.microsoft.com/en-my/powershell/module/secureboot/get-securebootuefi?view=windowsserver2022-ps) 177 | - [Microsoft guidance for applying Secure Boot DBX update (KB4575994)](https://support.microsoft.com/en-gb/topic/microsoft-guidance-for-applying-secure-boot-dbx-update-kb4575994-e3b9e4cb-a330-b3ba-a602-15083965d9ca) 178 | - [KB5016061: Secure Boot DB and DBX variable update events](https://support.microsoft.com/en-gb/topic/kb5016061-secure-boot-db-and-dbx-variable-update-events-37e47cf8-608b-4a87-8175-bdead630eb69) 179 | - [KB5036210: Deploying Windows UEFI CA 2023 certificate to Secure Boot Allowed Signature Database (DB)](https://support.microsoft.com/en-gb/topic/kb5036210-deploying-windows-uefi-ca-2023-certificate-to-secure-boot-allowed-signature-database-db-a68a3eae-292b-4224-9490-299e303b450b) 180 | - [How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932](https://support.microsoft.com/en-us/topic/how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d) 181 | - [Windows Secure Boot certificate expiration and CA updates](https://support.microsoft.com/en-us/topic/windows-secure-boot-certificate-expiration-and-ca-updates-7ff40d33-95dc-4c3c-8725-a9b95457578e) 182 | - [Secure Boot Certificate updates: Guidance for IT professionals and organizations](https://support.microsoft.com/en-us/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f) 183 | - [Registry key updates for Secure Boot: Windows devices with IT-managed updates](https://support.microsoft.com/en-us/topic/registry-key-updates-for-secure-boot-windows-devices-with-it-managed-updates-a7be69c9-4634-42e1-9ca1-df06f43f360d) 184 | - [Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates](https://support.microsoft.com/en-us/topic/guidance-for-blocking-rollback-of-virtualization-based-security-vbs-related-security-updates-b2e7ebf4-f64d-4884-a390-38d63171b8d3) 185 | - [Windows will apply a Secure Boot Advanced Targeting (SBAT) update to block vulnerable Linux boot loaders](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-40547) 186 | - [Check-Dbx.ps1](https://gist.github.com/out0xb2/f8e0bae94214889a89ac67fceb37f8c0#file-check-dbx-ps1) 187 | - [Get-UEFIDatabaseSignatures.ps1](https://gist.github.com/out0xb2/f8e0bae94214889a89ac67fceb37f8c0?permalink_comment_id=4572467#gistcomment-4572467) 188 | - [Only the latest DBX update is needed (1)](https://gist.github.com/out0xb2/f8e0bae94214889a89ac67fceb37f8c0?permalink_comment_id=4661159#gistcomment-4661159) 189 | - [Only the latest DBX update is needed (2)](https://gist.github.com/out0xb2/f8e0bae94214889a89ac67fceb37f8c0?permalink_comment_id=4661596#gistcomment-4661596) 190 | - [UEFI Revocation List File](https://uefi.org/revocationlistfile) 191 | - [Microsoft - Secure Boot Objects](https://github.com/microsoft/secureboot_objects) 192 | - [Evolving the Secure Boot Ecosystem](https://uefi.org/sites/default/files/resources/Evolving%20the%20Secure%20Boot%20Ecosystem_Flick%20and%20Sutherland.pdf) 193 | - [Update the dbx database to add back the same dbx entries as the cumulative update applied](https://support.hp.com/my-en/document/ish_9642671-9641393-16#GUID-49C8C19D-32CC-4FF9-A635-4A87C0BB0046) 194 | -------------------------------------------------------------------------------- /dbx_info/dbx_info.csv: -------------------------------------------------------------------------------- 1 | SHA 256 FLAT,PE256 Authenticode,Filename,Architecture,Partner,CVEs,Revocation List Date 2 | 2DF05C41ACC56D0F4C9371DA62EC6CB311C9AFB84B4A4D8C3738583CCC874D38,C805603C4FA038776E42F263C604B49D96840322E1922D5606A9B0BBB5BFFE6F,BOOTX64.EFI,64-bit, Ciscso Systems Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 3 | AA6F27B8B2CA5826F497362042C003B5E1D7CA22383D82730FBC5C45E048D839,56FB79AAB26EE9D0E0CA372FB86A8BB459ACBC505D0AB35E6A632A3D5F88DCB3,bootia32.efi,32-bit,Neverware,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 4 | 3F8F266488F3B888EB77B8DF43582FA8124366B7D0670ED78926410F9C9F411F,D8D4E6DDF6E42D74A6A536EA62FD1217E4290B145C9E5C3695A31B42EFB5F5A4,bootx64.efi,64-bit,Neverware,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 5 | 4E371DD0448F1DE869EE087B59FF88D11865463715272BCC6C29B0D5E21DBD82,F277AF4F9BDC918AE89FA35CC1B34E34984C04AE9765322C3CB049574D36509C,bootx64.efi,64-bit,Miray Software AG,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 6 | A9F6C38C2608D6F36F246E74A9FD17E915C89E54EAFA2281B8ACE86133DF22B3,ADCC0B6FD6DC5911BF42F036C033FC3E43F07A8312E91D0D8D32793B62940C7E,BOOTia32.efi,32-bit,whitecanyon,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 7 | 0E5EB8D0BEBF089A974BC0CA85D33D73F9A0BF72ED2A5E3A62A0387B51D509CE,68EE4632C7BE1C66C83E89DD93EAEE1294159ABF45B4C2C72D7DC7499AA2A043,bootx64.efi,64-bit,Miray Software AG,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 8 | F88E92940985413ACD440DAA20C08DF99C54613636826D9D95B898D39C44B19B,148FE18F715A9FCFE1A444CE0FFF7F85869EB422330DC04B314C0F295D6DA79E,bootmgfw.efi,64-bit,Microsoft,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 9 | 50484376441815F7F85AA294290A9B6072A6A9E8FEAE79447C5C4DE855C5A3D3,AD3BE589C0474E97DE5BB2BF33534948B76BB80376DFDC58B1FED767B5A15BFC,BOOTx64.efi,64-bit,whitecanyon,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 10 | 7B5DFE4F9E4EE68E3CDD9C91BCAE26DB334D49AE4C1F9525CECD834DE48DF110,E051B788ECBAEDA53046C70E6AF6058F95222C046157B8C4C1B9C2CFC65F46E5,bootx64.efi,64-bit,NTI Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 11 | 0DD832075D552DA3D29B1EF471FC23B47C0D54B9FD1541935B23F1C5813DA08C,C452AB846073DF5ACE25CCA64D6B7A09D906308A1A65EB5240E3C4EBCAA9CC0C,BOOTX64.EFI,64-bit,Alt Linux LTD,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 12 | 2F871712447DDE7C3552F5AA90A2292821C6F32D92788E00DEE8566F8D4DE209,98CC8B91FEC5252F62E81843D9D5D8AC2A2F253AA38152B3236A5092200ED290,bootia32.efi,32-bit,Alt Linux LTD,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 13 | 5156A8AE596C06692AEF13AC6524C7F1E20D52E4EA0F5A5AD43A6874EDCC5E1F,3A91F0F9E5287FA2994C7D930B2C1A5EE14CE8E1C8304AE495ADC58CC4453C0C,bootx64.efi,64-bit,Alt Linux LTD,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 14 | CEF9A1B433C4ED851EC0C373F7E1F19A2B8C306A821D114F177B14E8C070276F,1B909115A8D473E51328A87823BD621CE655DFAE54FA2BFA72FDC0298611D6B8,,64-bit,Alt Linux LTD,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 15 | C4B5797189521611B809720ED9C4734F1DEC8A2EE2597781FFE438F652A58CE5,8C0349D708571AE5AA21C11363482332073297D868F29058916529EFC520EF70,bootx64.efi,64-bit,Alt Linux LTD,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 16 | 5C39F0E5E0E7FA3BE05090813B13D161ACAF48494FDE6233B452C416D29CDDBE,C452AB846073DF5ACE25CCA64D6B7A09D906308A1A65EB5240E3C4EBCAA9CC0C,,64-bit,Alt Linux LTD,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 17 | 9EA346FCFE6DB7F3140DA8FFD5738F6CF97D6014DA61033B32049CB17696B372,EED7E0EFF2ED559E2A79EE361F9962AF3B1E999131E30BB7FD07546FAE0A7267,,64-bit,Alt Linux LTD,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 18 | E352109145416E3B61DCF5E09492D24410828121E7D74C08CE0D3157B45A0831,BADFF5E4F0FEA711701CA8FB22E4C43821E31E210CF52D1D4F74DD50F1D039BC,BOOTx64.EFI,64-bit,BITDEFENDER,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 19 | A95666BFAF48FD9C4CAF2F3ED4EB593145C48BD3C93E4B00638088CE7EE962CF,D89A11D16C488DD4FBBC541D4B07FAF8670D660994488FE54B1FBFF2704E4288,,64-bit,BITDEFENDER,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 20 | AECD34387179AFF5CE02103679312CDEB1DA835015A8548FCE93765E7219612E,F2A16D35B554694187A70D40CA682959F4F35C2CE0EAB8FD64F7AC2AB9F5C24A,,64-bit,BITDEFENDER,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 21 | 24D6B301A1268BA8B373275981538855205EB0115609800F2B5B95377483B108,5B248E913D71853D3DA5AEDD8D9A4BC57A917126573817FB5FCB2D86A2F1C886,bootx64.efi,64-bit,Blancco Technology Group,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 22 | 3D23947C39680B9FCF22B092B97C9D38EDCC02F7AD13D3A925D1EE0B62797E73,7EAC80A915C84CD4AFEC638904D94EB168A8557951A4D539B0713028552B6B8C,grubx64.efi,64-bit,Canonical,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 23 | 0AC2943ABF5EF953B939247B74331FB2C437E405A81DD5569D9CFF1D6183D53A,E7681F153121EA1E67F74BBCB0CDC5E502702C1B8CC55FB65D702DFBA948B5F4,gcdx64.efi,64-bit,Canonical,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 24 | 8E8ADDB29426D845A0101C2C1F26C2E7FE8C78128AB04F16CFCB4E06461B0101,804E354C6368BB27A90FAE8E498A57052B293418259A019C4F53A2007254490F,grubnetx64.efi,64-bit,Canonical,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 25 | 96520E78051325998A6D82FFFEE0366F85289E6D8834D1F3DA9082C6EE146D26,B93F0699598F8B20FA0DACC12CFCFC1F2568793F6E779E04795E6D7C22530F75,,64-bit,Canonical,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 26 | E4FF4E538B4758E8E49010ED16D6D5380417B146F3E8806ACB3AC40611646FDB,EAFF8C85C208BA4D5B6B8046F5D6081747D779BADA7768E649D047FF9B1F660C,,64-bit,Cumulus Network,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 27 | AEF3E0A113345C1ADCA2D627C5853A11DDFC4E0E07FD28C10049A9B766C0FBC5,C9EC350406F26E559AFFB4030DE2EBDE5435054C35A998605B8FCF04972D8D55,bootnetx64.efi,64-bit,Debian Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 28 | 23EBFBC7BC286CEFC68B4920784B926EC28D7965815238325FBD17892177D6F3,340DA32B58331C8E2B561BAF300CA9DFD6B91CD2270EE0E2A34958B1C6259E85,,64-bit,EgoSecure,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 29 | 5C39F0E5E0E7FA3BE05090813B13D161ACAF48494FDE6233B452C416D29CDDBE,5C39F0E5E0E7FA3BE05090813B13D161ACAF48494FDE6233B452C416D29CDDBE,,64-bit,EgoSecure,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 30 | 191A99A1EF854CE43E64D1CE2FDCC0C942200B88D232F8823A439CBCD7D148C1,DD59AF56084406E38C63FBE0850F30A0CD1277462A2192590FB05BC259E61273,,64-bit,Endless OS,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 31 | 4B2BD93B32DE4BE7235C95C97AF98E12BED5F0602B7B428700F9A1348CB2F731,0FA3A29AD05130D7FE5BF4D2596563CDED1D874096AACC181069932A2E49519A,bootx64.efi,64-bit,Endless OS,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 32 | 6A6F1C13EEFCBA07C0FC8AA0B70AB6FE2BC709A9EAF83090B735FEC8E0DD576B,CF3F7C24AF6D46E133BB6A936902A47413394B2A8ADDC63A8890C75EB7C3A6C7,BOOTIA32.EFI,32-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 33 | 475552C7476AD45E42344EEE8B30D44C264D200AC2468428AA86FC8795FB6E34,DBAF9E056D3D5B38B68553304ABC88827EBC00F80CB9C7E197CDBC5822CD316C,bootx64.efi,64-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 34 | E6CB6A3DCBD85954E5123759461198AF67658AA425A6186FFC9B57B772F9158F,0CE02100F67C7EF85F4EED368F02BF7092380A3C23CA91FD7F19430D94B00C19,BOOTX64.EFI,64-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 35 | E1DC3EF55626A4CF6DDC425A353208F309271B8A9FDBF8964082FB08DFB7A170,2B2298EAA26B9DC4A4558AE92E7BB0E4F85CF34BF848FDF636C0C11FBEC49897,,64-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 36 | 52A4F27CCEDCC5405D8EC128BF99861865B2273DA18A9B958ABADEFF63DF5A18,3765D769C05BF98B427B3511903B2137E8A49B6F859D0AF159ED6A86786AA634,,64-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 37 | 9E5773C34073B8473BD1EBC9D4D50780A7CDF9EB767750107D4B0F45BC8EABE8,78B4EDCAABC8D9093E20E217802CAEB4F09E23A3394C4ACC6E87E8F35395310F,,64-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 38 | F06D3E0F031A2FDC63DD2BA2BE7F32E0D432434C3515C2F840D812FFBFA530F6,9954A1A99D55E8B189AB1BCA414B91F6A017191F6C40A86B6F3EF368DD860031,,64-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 39 | 2F1DAE62EA074FD06DBBF620009CB3E65988D15431A061EAAB4D7ED1A97A3689,D14EE5616DC8EC74D695AF08DACC78BBEFAFA7A97A5CFEAB9B961E86CE9EDD37,,32-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 40 | A120F42DE7B5BFCB55C40AFC857B6BAF4D1AC60725500C27A5B2942BDA970CCF,F1B4F6513B0D544A688D13ADC291EFA8C59F420CA5DCB23E0B5A06FA7E0D083D,BOOTX64.EFI,64-bit,Fedora Project,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 41 | F8E2A41C0444D7DA76FC1682F3EB7E2A90140E1B68B413F4426BAC357CBE14BB,F1863EC8B7F43F94AD14FB0B8B4A69497A8C65ECBC2A55E0BB420E772B8CDC91,BOOTX64.EFI,64-bit,HP,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 42 | BBD53435E3881C13F6EF3D7C17DDE9BCCF2BB2D95D303DC4623CD1AA8F51EF23,781764102188A8B4B173D4A8F5EC94D828647156097F99357A581E624B377509,,64-bit,HP,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 43 | A2BE1EB17E12E0A66A87342C9D1CFD4D7DB81504A16B4FCB32F15C6BAA3F589D,E6856F137F79992DC94FA2F43297EC32D2D9A76F7BE66114C6A13EFC3BCDF5C8,,64-bit,HP,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 44 | D4D97AEAB61079D3EB0E55794504991DD1BEB0F200315718FFE44BAE89F8F330,81A8B2C9751AEB1FABA7DBDE5EE9691DC0EAEE2A31C38B1491A8146756A6B770,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 45 | 98ACBA206E9F3843A4A7E07C66EAD4366FBE7976653B65ED0C311D4EFAE878AB,9FA4D5023FD43ECAFF4200BA7E8D4353259D2B7E5E72B5096EFF8027D66D1043,HfiPcieGen3,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 46 | D8E8197BB6CB93157BAE6B4E63EFFA60BB49628DEBB6F771F154C229F4205DB3,D372C0D0F4FDC9F52E9E1F23FC56EE72414A17F350D0CEA6C26A35A6C3217A13,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 47 | 6484A487192E0B44CBD30EB7B3D436A9150D5B5AD271974764366BDC4E8677BB,09F98AA90F85198C0D73F89BA77E87EC6F596C491350FB8F8BBA80A62FBB914B,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 48 | 3141C6EF9FCE61084D16F0659A9596B0156F24D6F4B03837C4B7543CFB378D61,147730B42F11FE493FE902B6251E97CD2B6F34D36AF59330F11D02A42F940D07,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 49 | CD0F9839C6CCBEC5CE38B882E1AB23C8AB44A8993E6B8A02026D8314EAC4EA4C,29CCA4544EA330D61591C784695C149C6B040022AC7B5B89CBD72800D10840EA,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 50 | 55A3628537C4FBDA0FA7D27001EB2DFCDC515D8A48649715A31E1D0065A7DA35,2DCF8E8D817023D1E8E1451A3D68D6EC30D9BED94CBCB87F19DDC1CC0116AC1A,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 51 | BAE97EFC507382C0BDF7B1E74DBC38C0E31BF65186B7989CD9C7AF29DA27F656,3A4F74BEAFAE2B9383AD8215D233A6CF3D057FB3C7E213E897BEEF4255FAEE9D,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 52 | C31524CF5814D19C11611A5E5C27B2071DCB76B7EC6DC2DEC93FF9DE5CE656DE,4185821F6DAB5BA8347B78A22B5F9A0A7570CA5C93A74D478A793D83BAC49805,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 53 | 29DA5912698EE1928C239D394EF95A4BEEF0DC59262B6BFFEC24FA205C4B8A10,45876B4DD861D45B3A94800774027A5DB45A48B2A729410908B6412F8A87E95D,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 54 | 0ED1B0FAE1A6E705D1B116D08B7184E0A2EE2A0E6B0C372CE69B40E9EF34579F,5890FA227121C76D90ED9E63C87E3A6533EEA0F6F0A1A23F1FC445139BC6BCDF,HfiPcieGen3,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 55 | 5875DB0835E08A9189F23833B21774FDD1C4C3BD4C5D3459471A49B85CFFD1E1,5D1E9ACBBB4A7D024B6852DF025970E2CED66FF622EE019CD0ED7FD841CCAD02,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 56 | 10368826DC89AF42B4AD7E69A9E1F4DA9486DD645C088F445998E8DCA18EB0D4,6DEAD13257DFC3CCC6A4B37016BA91755FE9E0EC1F415030942E5ABC47F07C88,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 57 | 690B765C38BE3FBA65B829677D98A67943F92E24E9860EE2A13273F5932B8A0A,BEF7663BE5EA4DBFD8686E24701E036F4C03FB7FCD67A6C566ED94CE09C44470,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 58 | 07058C9BBCCB99D58FC93EBE2C007CFE28E1BF74E51954584AA3D3CA06689FBA,CF13A243C1CD2E3C8CEB7E70100387CECBFB830525BBF9D0B70C79ADF3E84128,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 59 | 6AE5984A47CCE9129498E534DB84F0FD33FE9AEE2860462414416282EB0CF34A,DF02AAB48387A9E1D4C65228089CB6ABE196C8F4B396C7E4BBC395DE136977F6,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 60 | 407326C7F1C837A861EE8D187170C779A9B6A25B0736761645D7E549EBFA17C2,DF91AC85A94FCD0CFB8155BD7CBEFAAC14B8C5EE7397FE2CC85984459E2EA14E,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 61 | 0CCD31ED42FF79E74FBA9C064F59F698E3AE9F9E690BE296EA63936E81982000,E36DFC719D2114C2E39AEA88849E2845AB326F6F7FE74E0E539B7E54D81F3631,,64-bit,Intel Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 62 | 561D28E0888CDB0A8FCE41754742AA8EB1BF5C8DD4EACBF9AF0F40E0D36013C2,E24B315A551671483D8B9073B32DE11B4DE1EB2EAB211AFD2D9C319FF55E08D0,bootx64.efi,64-bit,Isoo Software Dev Co Ltd,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 63 | 56F9E50DA4817B1DE9D9291EB5F2BC63703CA3E6F4A8571BDE28CF756E2C80BA,BD882355BF6813CF88EC0B83B6133691100F480381AC06531C3D5909CF1FB626,bootia32.efi,32-bit,Isoo Software Dev Co Ltd,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 64 | 9D61099DE8327EFEFF7E4AEA81D9F3396A2218E6B22E15D05032A765897C0EBA,B3E506340FBF6B5786973393079F24B66BA46507E35E911DB0362A2ACDE97049,shim.efi,64-bit,Micron Technology,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 65 | B06DC8F3DE1E7E5A53DC7AD0F8028F78A843DF54884B4A92BCEC21071F0E649B,7BC9CB5463CE0F011FB5085EB8BA77D1ACD283C43F4A57603CC113F22CEBC579,bootx64.efi,64-bit,NTI Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 66 | 2B91C0C8C0F156ABC8F85274C1320C038AF0179FE4696260B1011D5361E50AEA,41CCE0FC467609CA368BEDBA45C292F2BE1B622FB9BE0473CF51E7A96EE65652,,32-bit,Microsoft,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 67 | 2AEC3E859816EFA89AF844D6DD8CCAEA345A851CB23006D3C2928081352BEB25,91971C1497BF8E5BC68439ACC48D63EBB8FAABFD764DCBE82F3BA977CAC8CF6A,,64-bit,Microsoft,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 68 | 3F8091F700DA0DD082C6C06D0D3B68DB8D51FBE03198BBD6E4FA0D4A9EACA522,2F9A8EB6C8E18E7E118AFE9B51E233D88EC76C0EA256FF1F2A842B3A0EA9F466,,32-bit,Novell Systems,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 69 | 0FB12613BC1D4AB6FBB256574EBA9347AE3A87F96E4A3C259028B55CDE1D8053,BC75F910FF320F5CB5999E66BBD4034F4AE537A42FDFEF35161C5348E366E216,,64-bit,Now Computing LLC,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 70 | 8310F47BA34EB1ACA146A5BDB8B59138173E659FBEB57A4C89355D8C54930B6B,56B3DA7259EB1BEC44199A7EBF74C6FE912C8FE9BF4A20A7610C5E9BC0B601CD,,32-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 71 | 6A86152DF323185DCD535369C94B9226FEB6AAB4479C00A4A916B4E82E4A85FE,65F3C0A01B8402D362B9722E98F75E5E991E6C186E934F7B2B2E6BE6DEC800EC,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 72 | 04A779863E698705914958CFCF521450B8D2C9AE321DFE36A2DFDA00AE75ADC1,1D5C15CED73845B7E968BF3ACE52C5C660AA2DA6DDEFF2CE6445A04B885A0F12,,32-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 73 | 06EDB9F17A9007C8B6DB6EE2FC240E88E238F06C7C983F987CD9BE1B80010D04,2679650FE341F2CF1EA883460B3556AAAF77A70D6B8DC484C9301D1B746CF7B5,BOOTX64.efi,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 74 | 6E79E3D0580D244C2FC2179A4F08CB80F945AD33D8C4C325DE4E35E0D41584C5,E7C20B3AB481EC885501ECA5293781D84B5A1AC24F88266B5270E7ECB4AA2538,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 75 | AD1A9C1667E89214EE947D6B40D61BFFB7EA942ABCCE85319520CC3DE301FA1B,8EC2540CEDDD592E616AF4386DA9EAF76855EF0A792E26FC149B32E951D76C85,,32-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 76 | 0CA03AD1A65AFE81EC23E2B20E05D80C41AAEB5D6D5F98E2D0C5661F46E0CE9F,47FF1B63B140B6FC04ED79131331E651DA5B2E2F170F5DAEF4153DC2FBC532B1,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 77 | BA44BD2BB872DD6C6A8687F65CC138585A963473203D6F3F64770E5365812630,47FF1B63B140B6FC04ED79131331E651DA5B2E2F170F5DAEF4153DC2FBC532B1,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 78 | 899AFE09E356003605B30DC209A5BA4EF6910BAEF23FAC268BCAC6DB3CFEE98D,894D7839368F3298CC915AE8742EF330D7A26699F459478CF22C2B6BB2850166,BOOTX64.EFI,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 79 | 1CC3D6DA3017F0F1422D1B8115622EDEF65FBC497487234D17F4D356670F28EB,1F16078CCE009DF62EDB9E7170E66CAAE670BCE71B8F92D38280C56AA372031D,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 80 | 7C2FDA323F09B9BE6269BA979A620438413EBA4A93B2BA34F9B39998268AD9CD,37A480374DAF6202CE790C318A2BB8AA3797311261160A8E30558B7DEA78C7A6,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 81 | 65C4AAB0884825A8A2E4C114020E4FDB58A1D2B0CB68B7714A05D6CDE3F821D1,408B8B3DF5ABB043521A493525023175AB1261B1DE21064D6BF247CE142153B9,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 82 | 44FD1F90799B852B3BED642DE300BCF9EF6CA81036CD5588C24D5B8E00D4B9D1,540801DD345DC1C33EF431B35BF4C0E68BD319B577B9ABE1A9CFF1CBC39F548F,,64-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 83 | 5D6A0CBDAAF188974E98ACA06E664B4AE98D458327717A20B1FF6C80518EEA3D,A7DFCC3A8D6AB30F93F31748DBC8EA38415CF52BB9AD8085672CD9AB8938D5DE,,32-bit,Oracle Corporation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 84 | 62C6AFFBEE1BA9A0435562DB6E092A5018EFFEED0BD0F1D0494F34CE6CD403E9,89F3D1F6E485C334CD059D0995E3CDFDC00571B1849854847A44DC5548E2DCFB,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 85 | C7D9DAB91B726DEA5ABAA893D8F60BD4795F489894044DC56A9D3AAD9CC49740,7F3BDD2E92AE417B2143CC993C7FE48D9363FFA65C9CC461B6A407A779998174,BOOTIA32.EFI,32-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 86 | 0E99607B20D537497169C506C6893243D3F1BD5960505C1566BD97C0A741ADFB,9F1863ED5717C394B42EF10A6607B144A65BA11FB6579DF94B8EB2F0C4CD60C1,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 87 | 24558C1CB417B6387E2406C70FF13F5438506E8D7560DD7B226499C872C8076F,BB1DD16D530008636F232303A7A86F3DFF969F848815C0574B12C2D787FEC93F,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 88 | 953A7719B50073E701730FCFF79B2FEE7054C72C54D1F0B0F2571D3CE7FDB925,3E333DE87D211247B2AB00093CAB48F6069D718AFD29E9917A3D5F60E87557B6,BOOTIA32.EFI,32-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 89 | FB5EEBCD4100593A1B2890267037B7701C83F32C284B99908FF1C34D5693BFC2,02E6216ACAEF6401401FA555ECBED940B1A5F2569AED92956137AE58482EF1B7,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 90 | D57F40A0E9018765CD79393A0D57D8E6D6D880D93B95FA57CEDBDA5A0B4A1AE3,6EFEFE0B5B01478B7B944C10D3A8ACA2CCA4208888E2059F8A06CB5824D7BAB0,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 91 | 67FE6B4B726451375E2DC3F87A0954CD01083FB4D8F4FB074BF699536450AF04,B7D3E3C4A930FFFCDB184619534EF7C3D45435EF97F7988611714F5523B207E5,BOOTIA32.EFI,32-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 92 | 537B428A0AD622765010C4405C1603FF464FCBB24AE4C2FBF559A10B8EA4593D,0DC24C75EB1AEF56B9F13AB9DE60E2ECA1C4510034E290BBB36CF60A549B234C,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 93 | 338B89190177E950151A198823FD9D5F4EA25C1FAF73E56CA5D9CF69D373FD66,835881F2A5572D7059B5C8635018552892E945626F115FC9CA07ACF7BDE857A4,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 94 | DF4E1CF6EAF602F99849DDB6802BD91FB13CD5C3F9FB420250D8A3D750642EFA,3ECE27CBB3EC4438CCE523B927C4F05FDC5C593A3766DB984C5E437A3FF6A16B,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 95 | 0CE7F3FEC8BBB04E182027DD6800B7993E9F14EB579504DDECDD2F06294D7739,0C51D7906FC4931149765DA88682426B2CFE9E6AA4F27253EAB400111432E3A7,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 96 | B76C5689D45E7F40F8D78468D4484074167563CB06368CBB9CB4DBED65E1192A,631F0857B41845362C90C6980B4B10C4B628E23DBE24B6E96C128AE3DCB0D5AC,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 97 | 487DF121FD496D9A443C3598DA3771FA187D408C589F4CB990041E546C529539,947078F97C6196968C3AE99C9A5D58667E86882CF6C8C9D58967A496BB7AF43C,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 98 | BDD96B78F3AA4B123851342995451880CB2498E785ED12E48CEB36F1A3F49B2B,A924D3CAD6DA42B7399B96A095A06F18F6B1ABA5B873B0D5F3A0EE2173B48B6C,BOOTX64.EFI,64-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 99 | 24AF7036C63F09FEBAB1B84372ECD6151BE32CDC94E80E57F52F7D2C3665FBC4,F8DD2281C67C59A08FDDC9859E9D5FF73802CAD88975242BD11486F13C6DDA6B,,32-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 100 | 777ADC7E8A3E1422B3FC9C10CE31E996C057FE801A5292F0902BD5C5365E7287,95049F0E4137C790B0D2767195E56F73807D123ADCF8F6E7BF2D4D991D305F89,bootx64.efi,64-bit,SEAGATE Technology,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 101 | 608854C2B7A26B00A3970757C2FA176B361F74FE094F7CFA482C439071279548,06EB5BADD26E4FAE65F9A42358DEEF7C18E52CC05FBB7FC76776E69D1B982A14,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 102 | 5613DD1553044BEF74610BC012D676375588421FF0000B69DCF62D1081451ECE,0928F0408BF725E61D67D87138A8EEBC52962D2847F16E3587163B160E41B6AD,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 103 | D764AC6251FD2641EEBBFBF7A5A95E212DF5997875990D90562CA65D5D966BAE,0D85DAAA481B1BE84320E12B5078794DA29628ACB43B69C8909D291BB995CA72,,32-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 104 | 9C904F10520295D070DB9CF381101512946AB832C2BD92D4E92D42B934F40DC3,1D8B58C1FDB8DA8B33CCEE1E5F973AF734D90EF317E33F5DB1573C2BA088A80C,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 105 | FD1CD4D4A1AC691E7A0AF14C3DFB17DAF3F2E6A2B286C9E233070979EC36BB6F,270C84B29D86F16312B06AAAE4EBB8DFF8DE7D080D825B8839FF1766274EFF47,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 106 | EE721020DB7794DE74F59992A2C6B4DCA5B9FD584BBCBDEF96930B9A7132BE1C,311A2AC55B50C09B30B3CC93B994A119153EEEAC54EF892FC447BBBD96101AA1,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 107 | BA0610793FAA746150C0FD5689158B01DEEEA7320E2F14B31EE9AF4F2C4D1587,32AD3296829BC46DCFAC5EDDCB9DBF2C1EED5C11F83B2210CF9C6E60C798D4A7,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 108 | 957D8826BEE05DFEA66994C237E61BD70CC0115CC176E1D931F1D892C6C16814,367A31E5838831AD2C074647886A6CDFF217E6B1BA910BFF85DC7A87AE9B5E98,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 109 | D8C26A5324CA74212B59B59BEF1BC33FB5B6946DCDDE84414C60A2E315EDE741,3AE76C45CA70E9180C1559981F42622DD251BCA1FBE6B901C52EC11673B03514,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 110 | A7094801F966FC5C253DBD17066AF5BBCB3AF5E281D0A4DAB24E30C7A4B0FB12,3BE8E7EB348D35C1928F19C769846788991641D1F6CF09514CA10269934F7359,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 111 | 299E3B66B0283E23793E03FBA6B795A2C6B6034864B6D571449945EBA0D90A20,3E3926F0B8A15AD5A14167BB647A843C3D4321E35DBC44DCE8C837417F2D28B0,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 112 | 0742A120E871BBB67D6947D05E9301CDACBCCB4AF650464F996B40352CA9699B,400AC66D59B7B094A9E30B01A6BD013AFF1D30570F83E7592F421DBE5FF4BA8F,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 113 | 0692A9566F22F280715080EE24B8FF54ED7372A98BD4994670FCF862035281B5,4667BF250CD7C1A06B8474C613CDB1DF648A7F58736FBF57D05D6F755DAB67F4,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 114 | 439983268FC8238CB2DC187B033904DBD682929852D846FB69A22DDA1561A422,57E6913AFACC5222BD76CDAF31F8ED88895464255374EF097A82D7F59AD39596,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 115 | A739C0624B7608F40645D417E79CE0B22FA568D885ACEBE51949F268565098B4,65B2E7CC18D903C331DF1152DF73CA0DC932D29F17997481C56F3087B2DD3147,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 116 | D389EDE1F84051086D30B8C2CFC362797B129854DF1313CA474F83A143F55D11,788383A4C733BB87D2BF51673DC73E92DF15AB7D51DC715627AE77686D8D23BC,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 117 | 3D3434BC5A18F072D4CF59D5651F9CE05B61B6FC3C21EBBCF371777AA1E1E1D5,7F49CCB309323B1C7AB11C93C955B8C744F0A2B75C311F495E18906070500027,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 118 | 7D092A6101832F2CF3F9DE42C66A9948751B05D3D4005FB9C0E8BDF9B8DAEC6B,82ACBA48D5236CCFF7659AFC14594DEE902BD6082EF1A30A0B9B508628CF34F4,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 119 | 34440CB45EB6EC2532EF89D6FCD7D3D9BC2A021677BEBC9D65C47A725A6845D4,8D93D60C691959651476E5DC464BE12A85FA5280B6F524D4A1C3FCC9D048CFAD,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 120 | 103FE82E5F090184D8DB7A48801D1E503E3C6FC0726783E9A49A84F9FFD4C78A,9783B5EE4492E9E891C655F1F48035959DAD453C0E623AF0FE7BF2C0A57885E3,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 121 | 7C783057C245A34DFF5A9497C3CD4181FC80D06439884E12AD5D67A4F5266CD6,97A8C5BA11D61FEFBB5D6A05DA4E15BA472DC4C6CD4972FC1A035DE321342FE4,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 122 | 169D0AC3DA1DDA382812F7F221B8C9CD55961A05D876E3D812641313297848BA,992820E6EC8C41DAAE4BD8AB48F58268E943A670D35CA5E2BDCD3E7C4C94A072,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 123 | 707BEEAE9B9CBF0D56AEE48AE398F127D3B52FD37D25B95C561CDA1DB5233C50,9C259FCB301D5FC7397ED5759963E0EF6B36E42057FD73046E6BD08B149F751C,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 124 | B40F5FF7030848DB736573E06A1A1C5BF49F119E66DD0BA7E48E2651E2CE7059,9DD2DCB72F5E741627F2E9E03AB18503A3403CF6A904A479A4DB05D97E2250A9,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 125 | 9EABEA9AE699526AD519782DA21718DA7190490AA3436BBBD80269D4A4CC37C5,BDD01126E9D85710D3FE75AF1CC1702A29F081B4F6FDF6A2B2135C0297A9CEC5,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 126 | 83A5C9C78BC64206AAF7B7F9901867D19BB746201923D855AAE24A2B2330F113,BE435DF7CD28AA2A7C8DB4FC8173475B77E5ABF392F76B7C76FA3F698CB71A9A,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 127 | EDFFF0969567FF1C1867AA921EAA5CF4C65D20F0511BA7EE7328F7B67238DF53,C127F0EEFC2E451989D88E4D1DA8A3B08CA9D5884987A6157E04E9A71C01ADFC,,32-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 128 | AD215B731A41CBE37CAFEE5280FFC282A8AC23B5E8BA25DFF3D28A6AAE1D2A0D,C3505BF3EC10A51DACE417C76B8BD10939A065D1F34E75B8A3065EE31CC69B96,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 129 | DF224EF3B05794CBCE084C11BAAF3D85F380A5213D9097E400D9FA42FC412933,CB340011AFEB0D74C4A588B36EBAA441961608E8D2FA80DCA8C13872C850796B,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 130 | 97BB9FD717C396231E86ECBE5A760D56DBACF4AE8E963D16D724591E45919B65,CC8EEC6EB9212CBF897A5ACE7E8ABEECE1079F1A6DEF0A789591CB1547F1F084,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 131 | EDE70AA6A98D8130019296CE64B5CCF634A997B26401C0E119B96BBF7ACE1C0C,DA3560FD0C32B54C83D4F2FF869003D2089369ACF2C89608F8AFA7436BFA4655,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 132 | D84AE3F1BB7B2F2C41B986E473AD424CF6F1D136B4E91AA5F73824737169D820,E39891F48BBCC593B8ED86CE82CE666FC1145B9FCBFD2B07BAD0A89BF4C7BFBF,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 133 | FCCC2A01967926437DC0F5F49C6ACEED4DC67EBD7E99169023B5F89A7264CB98,EE83A566496109A74F6AC6E410DF00BB29A290E0021516AE3B8A23288E7E2E72,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 134 | 862EF2D92E8E0DF128007AEF6F9E4D6A6D0DE3C656A4D72D1A19A18068C23508,F31FD461C5E99510403FC97C1DA2D8A9CBE270597D32BADF8FD66B77495F8D94,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 135 | E33E9D1B1D5ADE1934AC7BD39F0BA4CEAC9459A7E2AABB8D204354D4C8652E6E,F48E6DD8718E953B60A24F2CBEA60A9521DEAE67DB25425B7D3ACE3C517DD9B7,,64-bit,SUSE Linux,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 136 | 6B6E59284750FC0E6FAC4D6C2A46100E9B0DDE54E000B7327EDD4A4DCED9E9A0,4B8668A5D465BCDD9000AA8DFCFF42044FCBD0AECE32FC7011A83E9160E89F09,bootx64.efi,64-bit,TeraByte Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 137 | D809EDDC88A14239E8A069FA71F81F3E4AF4DC293F7575D71D597C80F8767816,9D00AE4CD47A41C783DC48F342C076C2C16F3413F4D2DF50D181CA3BB5AD859D,bootx64.efi,64-bit,TeraByte Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 138 | 1BABF3FB76AE149CCB95B8E33B193CE7408B7134E0A5CC8CE1E884BCD01DFCF2,0A75EA0B1D70EAA4D3F374246DB54FC7B43E7F596A353309B9C36B4FD975725E,bootx64.efi,64-bit,TeraByte Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 139 | EE39A9A3FBDE8B15CE4AC34519E248EA746A52AE0AE680DA5B0C7EF919E583A3,96E4509450D380DAC362FF8E295589128A1F1CE55885D20D89C27BA2A9D00909,bootx64.efi,64-bit,TeraByte Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 140 | EEC3E281A5545CAF11EC02BB0DF159DA19698E639CBA0190A0AEC9AB09296BEB,A4D978B7C4BDA15435D508F8B9592EC2A5ADFB12EA7BAD146A35ECB53094642F,bootx64.efi,64-bit,TeraByte Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 141 | 83B1D2B20830EE199D8845C999D4680B1B2B6D9C1F424DD13826DA3FA7F7139E,386D695CDF2D4576E01BCACCF5E49E78DA51AF9955C0B8FA7606373B007994B3,,64-bit,The Broadband Computer Co,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 142 | 77F55C6E07D808021F9E66017605D8B2DED6C55944693641902C4CE821E37878,80B4D96931BF0D02FD91A61E19D14F1DA452E66DB2408CA8604D411F92659F0A,,64-bit,TrueCrypt Foundation,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 143 | 2B7A243AC2248C630A51D73889E4BAA33DA94BD58D63E364A5FEF1A0998B4F5E,70A1450AF2AD395569AD0AFEB1D9C125324EE90AEC39C258880134D4892D51AB,,64-bit,Univention GmbH,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 144 | EF43B4B4A755494B10B7431527AEAD697FEAB6FA48CF4684CCA4FB5B8CD09035,5C5805196A85E93789457017D4F9EB6828B97C41CB9BA6D3DC1FCC115F527A55,bootx64.efi,64-bit,VMware Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 145 | 7CEE7E91292E5591BA4597D312BCFE9C0EEB906B18B327B8983BA497F9921BF7,66AA13A0EDC219384D9C425D3927E6ED4A5D1940C5E7CD4DAC88F5770103F2F1,,64-bit,VMware Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 146 | 03C8C9956938147BCC81A19E580CA8B5214E82829EC0494C22B0F59013CA22B2,38909DAF2FE29BBFE22303939D3904F38DCA48B7F2A41F28F34DE564A0242781,BOOTIA32.EFI,32-bit,Red Hat Inc.,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 147 | 1275826206FEF9AA0A48A60BBC15300B3201F76F45E3CCE3FD0064DE2FC7CC5F,DCCC3CE1C00EE4B0B10487D372A0FA47F5C26F57A359BE7B27801E144EACBAC4,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 148 | 571B2AA6CA8EDF6479D3472814B8CDF34A0B8544939E5CE9F50261968E382B45,E800395DBE0E045781E8005178B4BAF5A257F06E159121A67C595F6AE22506FD,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 149 | 127B01B1F605183BBA4D1A07B7EEFE01BA88203A6CD6686B28F3883F33C0ED42,1CB4DCCAF2C812CFA7B4938E1371FE2B96910FE407216FD95428672D6C7E7316,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 150 | 8BF4FAC6F3981D1E6180DB0CD53152AE9666DC40884090A522840062E0C926E7,0257FF710F2A16E489B37493C07604A7CDA96129D8A8FD68D2B6AF633904315D,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 151 | DA31FE4698AD3D0E30408927BE36C938BF52FA9CB8D46B12F84F5D5EC22DD1C6,495300790E6C9BF2510DABA59DB3D57E9D2B85D7D7640434EC75BAA3851C74E5,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 152 | D92B8AC828B827E4E5B9E9AEB02676783CDB1884F42194823769CCF033A7B9C5,8E53EFDC15F852CEE5A6E92931BC42E6163CD30FF649CCA7E87252C3A459960B,bootx64.efi,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 153 | A1111555BFDE8807746C8AF73DECEB4BDADC52DEE87004E2AD7239C038687985,992D359AA7A5F789D268B94C11B9485A6B1CE64362B0EDB4441CCC187C39647B,sbs.efi,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 154 | E50F1F1E9FB9198E5B094773D1D0068CC1CB1987D06583ABACA20ADC1F8932A9,03F64A29948A88BEFFDB035E0B09A7370CCF0CD9CE6BCF8E640C2107318FAB87,shim.efi,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 155 | F69D87F5BC30026B00110DADD0264311D15DECE6B67F046506755284AF5EC002,05D87E15713454616F5B0ED7849AB5C1712AB84F02349478EC2A38F970C01489,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 156 | 6A3C1124A642244F23685B68D2E5A0AE036651AA401DE70B3912EFD044B62222,08BB2289E9E91B4D20FF3F1562516AB07E979B2C6CEFE2AB70C6DFC1199F8DA5,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 157 | 20E870697471F16EAC55A9658212F83A7E443CDB3844C7D1901B4D4271828F7D,1F179186EFDF5EF2DE018245BA0EAE8134868601BA0D35FF3D9865C1537CED93,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 158 | 8A73B6E52B27695C72D4776C0BCFA54D30C1340D534D5EEFF8D890377CDFDFAA,362ED31D20B1E00392281231A96F0A0ACFDE02618953E695C9EF2EB0BAC37550,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 159 | CB9E3E372C5F707858E1DE6421C2D3407C240F9D7BC43A9B9F3BA1F6037615B9,41D1EEB177C0324E17DD6557F384E532DE0CF51A019A446B01EFB351BC259D77,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 160 | B6C36B2B18A3E73EA007173F8669D9A9A861FDDF27C3E3C0C3F1315E2AE5B43F,61CEC4A377BF5902C0FEAEE37034BF97D5BC6E0615E23A1CDFBAE6E3F5FB3CFD,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 161 | 6E5D8278A7A4A58DBBA2F5D01B09B9DE4BB20ACD2DD4890846C8125A65136BF8,6873D2F61C29BD52E954EEFF5977AA8367439997811A62FF212C948133C68D97,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 162 | 88B530624B67FAA0C0C1039618958F4DE983A997A6FF762BCCA82B8201194F28,6DBBEAD23E8C860CF8B47F74FBFCA5204DE3E28B881313BB1D1ECCDC4747934E,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 163 | 3AE3DA82C39C6BEEFD251265370D57D5BFC67181662736C62F2E6F687409C81B,72C26F827CEB92989798961BC6AE748D141E05D3EBCFB65D9041B266C920BE82,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 164 | 94BDE75194960FAFF8329DCB4462BD8888B32078B0FB8FB2011C6993FDA0316A,9063F5FBC5E57AB6DE6C9488146020E172B176D5AB57D4C89F0F600E17FE2DE2,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 165 | 84A6C5F6C7AC07F1CC405F7B53B69BFF17BE0E4B9A428C21D39DCE0CDD4EF16B,91656AA4EF493B3824A0B7263248E4E2D657A5C8488D880CB65B01730932FB53,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 166 | 424C636253B4EFA0C69F91505EE16D7079956B8EDE4524FFCE211A1B037FF692,97A51A094444620DF38CD8C6512CAC909A75FD437AE1E4D22929807661238127,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 167 | 610D0A80FD4E876EAD581903B33C96ECC4B8BD7115FC9DF5579B3A25416FDAEF,9BAF4F76D76BF5D6A897BFBD5F429BA14D04E08B48C3EE8D76930A828FFF3891,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 168 | A121947909D35BB042F0049D18E4EE2B27941E10D14E4D6B1C11945CA79992E6,9ED33F0FBC180BC032F8909CA2C4AB3418EDC33A45A50D2521A3B5876AA3EA2C,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 169 | 8516257431A250296A10F82A4795F9CF68E5C185CEAA2F6F77CA0942CBE0C999,B8D6B5E7857B45830E017C7BE3D856ADEB97C7290EB0665A3D473A4BEB51DCF3,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 170 | EC16CFB5AE2297154394D9AB6B5B749DCE676404486D72A44064CD9A716EC1F9,BB01DA0333BB639C7E1C806DB0561DC98A5316F22FEF1090FB8D0BE46DAE499A,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 171 | C33397B499368E23DDA3FD5B9CC989647442F279EE6F80B53C620721C958346D,C2469759C1947E14F4B65F72A9F5B3AF8B6F6E727B68BB0D91385CBF42176A8A,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 172 | 561694642D87969C00583ED6C4BB6C41527DFF7164A079035E8C8B905A5E4B62,C42D11C70CCF5E8CF3FB91FDF21D884021AD836CA68ADF2CBB7995C10BF588D4,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 173 | AA8DB86BE59A48E4C525DD468119BEBA1D836CE4293C76E4B736902D1AD62F27,C69D64A5B839E41BA16742527E17056A18CE3C276FD26E34901A1BC7D0E32219,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 174 | 30A947ED2F95D0E7F2746F3A4F3C458FC64554295BA5B4C302FE0EE4F8027C0C,D9668AB52785086786C134B5E4BDDBF72452813B6973229AB92AA1A54D201BF5,,64-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 175 | AA909ADBB83E05F92BA2E1144C6A33CB320A760409E1015B00A9EED666063510,4EE45A217B38A8C13777DF0860F1255E52BAF3CF9D075373E31AD7E2C85E2CDB,,32-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 176 | 17F186C88052B988B4C9B62F8D7F55023AC317C82324DD5A958D05B8A1246F77,9E0D9074F146461F9ACEE7D27F2C7DD8BEE73EB62AC62CF87F03BEE0C4516528,,32-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 177 | 26A8EBB3EF412AA70D4AB4486EBEE8DB42656AE7F2EC868FA95FA656090F01BE,B52531C84351EB695A8AFF0B7A5BDF93972CDEDFAF4067745425D75E21CD0CBB,,32-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 178 | 459728935C400CBED125A0AA12D0E618CCB6F4FDE3194BB2D06A511DAA335350,B9B20E933E2B6C33C9FF088E224D802028F29A4CEBE50AB5D746027911A454FF,,32-bit,Unknown,CVE-2020-10713; CVE-2020-14308; CVE-2020-14309; CVE-2020-14310; CVE-2020-14311; CVE-2020-15705; CVE-2020-15706; CVE-2020-15707,20-Jul 179 | A1DD22421CC934E050572520A026985AE8C5FC5AD73816510713F1E1D4DFF575,01E2DA8EC5A6929DDBBBEB2E9807586FACDDCA6A7EF62BFEBB581BDC2D7274D6,rhel-8.3-20200730-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 180 | 3166EE4CE65D10105DEEE3A0163E236AC872E2C45652DC1DD78F8CE984463C12,040B3BC339E9B6F9ACD828B88F3482A5C3F64E67E5A714BA1DA8A70453B34AF6,shim-sles.efi,64-bit,SUSE Linux Products GmbH,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 181 | 1A9DDD9AF383AD81787CD7C6A6DC8C8AA86CD995157C32AD476B60D2C494F7FA,06C670F8572BF89ABAE13D14D81FFE80D5550F696862B1AB386E4D8C56B02016,centos-8.3-shim-20200726-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 182 | 10914C967939CA831D9D39B87332A6E8882FE99901DC0E4DE4931CA5A065B9FF,1142A0CC7C9004DFF64C5948484D6A7EC3514E176F5CA6BDEED7A093940B93CC,shim64-bit.efi,64-bit,"VMware, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 183 | 2CAD0B454397089723959FAAFC2DB5388C50DFD5C02319703BABA6F03654561C,172FA584B4EEA5A5D4104FB0AC30EDE032CCD31CD2675D7003D79A2CD0C243E6,rhel-7.9-20200730-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 184 | DEF0CE090F4C6B203C317558D43D015427311475231E8CE9B2E00AC0C18D3922,2629AE14B467DA5DF8E9EB6F1ADC1A9F50A78DBC3C246271C8530D0D35997A4C,rhel-7.9-shim-20200726-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 185 | FE09433ECE56EFB74EDFFB10BB4E2C05EF9FA3C37C5E60BD5E87FBDEEAB3EB40,288878F12E8B9C6CCBF601C73D5F4E985CAC0FF3FCB0C24E4414912B3EB91F15,rhel-8.3-20200730-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 186 | FE924700AC79DC4689ADD5F7C6761E0D60E665A65F9572B43915010881B0BFBC,2B7A7A4DAFC35E49D03CBE7118E6BA4582401E1776B9C18A2597725B05A605F1,rhel-7.9-20200909-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 187 | 84E680F95CD31DB85663A5482A68778DD236503D88E8A6D8E3C4A6C9BA201102,2EA4CB6A1F1EB1D3DCE82D54FDE26DED243BA3E18DE7C6D211902A594FE56788,shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 188 | 8C3A26B5831FF45BC3BCA44C2815951E2DA489A91BBCD295F12DFDBCED9958B9,398995770D21E9F66B90D69D1EDE16C9E58C0634B2F7D26B1F22501DD93FDAE5,centos-7.9-shim-20200726-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 189 | 258C72394A0D163E9196A16682D3881E6CB24171EDA78FE026CC9CA9BEBFF22E,40D6CAE02973789080CF4C3A9AD11B5A0A4D8BBA4438AB96E276CC784454DEE7,rhel-8.3-20200917-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 190 | 3BA74313087DB77CF93A00E072A2FAE00C0A472DAC5DD6988F9C0993A0769159,4AAC0A9E089DF8E9AC6725E0DFCA3AC11A17747A2E35F43A2B38A58F8AE2A273,rhel-8.3-20200917-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 191 | D662EF94388DB203CE52DF9902D77E9E5EFB25A202B5B096351D604FD3E63080,4F0214FCE4FA8897D0C80A46D6DAB4124726D136FC2492EFD01BFEDFA3887A9C,centos-8.3-shim-20200726-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 192 | 5C512E50028955AED91AF0317813C68B427A7F73A6497BDA82F4551BE1A04936,5C2AFE34BD8A7AEBBB439C251DFB6A424F00E535AC4DF61EC19745B6F10E893A,centos-7.9-shim-20200726-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 193 | 3C6318DC79E5CE66F7DCCC71DF01C4E4ACC53F14D978011A29033D59D43D9233,62B79FB4A04052FCB498A97F22A3567642D4BC47D1C2FF9A06311C8C6148E907,shimaa64.efi,64-bit ARM,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 194 | BD8020CC80D5F842DDFD5AC110C189707A83E85415EEA3386884ABDCFD7F3135,99D7ADA0D67E5233108DBD76702F4B168087CFC4EC65494D6CA8ABA858FEBADA,rhel-7.9-shim-20200726-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 195 | C2405153F56A12F727853FD55BC9C99B81937B42A1A0BC585310DA45D35A3FAD,A608A87F51BDF7532B4B80FA95EADFDF1BF8B0CBB58A7D3939C9F11C12E71C85,rhel-7.9-20200909-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 196 | 3898A72298BBF39E2E9B268DA9661B47B6AC5C160518089E27BF8DF25B77D584,BDD4086C019F5D388453C6D93475D39A576572BAFF75612C321B46A35A5329B1,shim64-bit.efi,64-bit,"Oracle America, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 197 | DA649429AA5899D242782ED21EC332A217C3D530296FC9D7A0E3F1F694EB7FE1,CB994B400590B66CBF55FC663555CAF0D4F1CE267464D0452C2361E05EE1CD50,cent-8.3-20200730-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 198 | 7B9D76B66E9E3503682EB5B6CCC8F70B8B5082F140252A7F6127AD9764D8F297,D472D0DCBA3F5DD61BE3931244717BF2230BABD30E9E2F6B2880BFCDC8FD6665,shimia32.efi,32-bit,"Oracle America, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 199 | 24357D13D3CFC29A7E83D86A6BB53FC932461B7D0A653701188D7B427C704FB1,D6EE8DB782E36CAFFB4D9F8207900487DE930AABCC1D196FA455FBFD6F37273D,rhel-7.9-20200730-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 200 | 5DB10187E0E8BB8D2FF649810E03F80FB6873370F3AB1F013811B8E9670F3863,DDA0121DCF167DB1E2622D10F454701837AC6AF304A03EC06B3027904988C56B,cent-7.9-20200730-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 201 | 2D07ABD75C154055A858D4461A1B1B76D763E9ED294E2E10244C20601E072A29,DDF3E4261419944F7C2F8B92F6D14C35060B4F94818CC4183F0C072706DEF726,cent-7.9-20200730-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 202 | 7395EE455BB71B4A37DD973999C875F166037E7BF5B948F812A8B45ADFC03A55,E42572AFAC720F5D4A1C7AAAF802F094DACEB682F4E92783B2BB3FA00862AF7F,shim64-bit.efi,64-bit,"Oracle America, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 203 | DF01F567CF2C2A7B872EB750F12EC534B6F207E760D1ACA6795DB7CB12CFD92D,E6236DC1EE074C077C7A1C9B3965947430847BE125F7AEB71D91A128133AEA7F,shim64-bit.efi,64-bit,HP Inc.,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 204 | 98721004CFF6B89B3E5A9267D29250710E6A6C8AFAE06EEF29F92745CD70E079,EF87BE89A413657DE8721498552CF9E0F3C1F71BC62DFA63B9F25BBC66E86494,rhel-8.3-shim-20200726-shim64-bit.efi,64-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 205 | 5E9D231F7BC2F98E9CBFBE65DA29F7B663A1E84FEE090250BD0976D65DB3FC0A,F5D396FC5AD8B7EAC22652129D56449DC30B6965CE3E41F5D76590E3B1ECFE62,cent-8.3-20200730-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 206 | 7B40290ADE5BA3316AFC08748CFAB5AE79FB30BB8B5972766D670C3887E3D294,F5E892DD6EC4C2DEFA4A495C09219B621379B64DA3D1B2E34ADF4B5F1102BD39,shim-opensuse.efi,64-bit,SUSE Linux Products GmbH,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 207 | 1BBE108A0DA8A6A15221BA576E985B4240AD603D7D967F710428A9CB53B97B0B,F7E4C7FB10755AC534BCDF61AA7FA18539E42E061C247891E9BA42E17290C742,shimia32.efi,32-bit,"Oracle America, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 208 | 96DD3FFBAB73A9DAA0CA93C34C4EDA5BD9C8AEEB0480C1A3BD93131F44CA9A29,FFF421A9DCD3EF38AD585E8BACA408AC2E4CDBDFA679900EC17089624E310ADA,rhel-8.3-shim-20200726-shimia32.efi,32-bit,"Red Hat, Inc.",CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 209 | 561EEF7131FFB079F75F6EC3E5738354A3C0EEB204863E7A4018B6409B7D26D0,D4241190CD5A369D8C344C660E24F3027FB8E7064FAB33770E93FA765FFB152E,shim-0~20120906.bcd0a4e8-0ubuntu3/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 210 | DD33B966BE5F3882EED189E583AA4CA4D28E74B356DDEFFA164234DD7E89ABCA,23142E14424FB3FF4EFC75D00B63867727841ABA5005149070EE2417DF8AB799,shim-0~20120906.bcd0a4e8-0ubuntu4/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 211 | FA07B984FB6FDD32DB497C55225E614759BFEB7093BE1F02AB2E30BE1869B2E7,91721AA76266B5BB2F8009F1188510A36E54AFD56E967387EA7D0B114D782089,shim-0.4-0ubuntu3/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 212 | 702A10FA1541869F455143ED00425E4E9B2D533C3B639259BDE6AAC97ECA15ED,DC8AFF7FAA9D1A00A3E32EEFBF899B3059CBB313A48B82FA9C8D931FD58FB69D,shim-0.4-0ubuntu4/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 213 | 17864E719E9C61D84E29A3CEDF2B63AEAECFC10867211EFC3077DD216B0A4965,9959ED4E05E548B59F219308A45563EA85BB224C1AD96DEC0E96C0E71FFCCD81,shim-0.7-0ubuntu4/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 214 | 45EC69179BE0F20088F10BE909FC8B6104F85607DB0A556482FEE9384EB4D52B,47B31A1C7867644B2EE8093B2D5FBE21E21F77C1617A2C08812F57ACE0850E9F,shim-0.8-0ubuntu2/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 215 | 889337B0F67FFBDDD260CEE774DFA332DBB4EAE7D11333B2DDBAD7CA7FA773A2,FABC379DF395E6F52472B44FA5082F9F0E0DA480F05198C66814B7055B03F446,shim-0.9+1465500757.14a5905-0ubuntu1/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 216 | 98799E6AD44F2AFF3D3D7B66E482B2F4DE4438F5752D932D12C97FF56FA1942B,E37FF3FC0EFF20BFC1C060A4BF56885E1EFD55A8E9CE3C5F4869444CACFFAD0B,shim-0.9+1474479173.6c180c6-0ubuntu1/shim,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 217 | 3C430C719C9053A74D74DCC5E52B40D10F109DB1DC9458A05A7A413B86A93467,4CDAE3920A512C9C052A8B4ABA9096969B0A0197B614031E4C64A5D898CB09B9,shim-0.9+1474479173.6c180c6-1ubuntu1/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 218 | 9BE93E365A8240A03B05DB26684B708B46D7585BE325A3E22170CD5B324E0CB0,5B89F1AA2435A03D18D9B203D17FB4FBA4F8F5076CF1F9B8D6D9B826222235C1,shim-13-0ubuntu2/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 219 | 8844D9B3AEA1568A7FF298E6DC12564C422DAFAE6510DB377454CA6072861DDE,007F4C95125713B112093E21663E2D23E3C1AE9CE4B5DE0D58A297332336A2D8,shim-15+1533136590.3beb971-0ubuntu1/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 220 | C58ABF55F773FEE60CDB21D01D02229C4A3FEEB29F5D904CEB3106BC4B435EE7,339C2BCF0445BAA7345A02CDE505E172D24CC9CEA29A92EBEE3F3901693FD2C8,shim-15+1533136590.3beb971-0ubuntu1/shimaa64.efi,64-bit ARM,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 221 | CE7A0A3D718747C7263D099FD1477E363ECFE75BD2F639EE47AC1271EC229D80,E060DA09561AE00DCFB1769D6E8E846868A1E99A54B14AA5D0689F2840CEC6DF,shim-15+1552672080.a4a1fbe-0ubuntu1/shim64-bit.efi,64-bit,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 222 | B6F807D4488F132AB873DCDE8EDAD2875961895E503F263B86BA34958A290618,A48B5E31477DA248680A8935D1E5E630E6FDE22277F9635DA7D6F7F9AA17E34A,shim-15+1552672080.a4a1fbe-0ubuntu1/shimaa64.efi,64-bit ARM,Canonical Ltd,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 223 | EBF3E0F060E9ECA943F49444CC0DBF6CBE1AEC2C20AE10DFB9E757335AA26ADD,3E828EF5E880FE62B33D36B78F2235F1A314153899AC80469597297B9A9DD22D,Signed_13652009334930799/shimaa64.efi,64-bit ARM,Debian,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 224 | FF9F39869BAAFA17592820F7F5CF101B15A8423831ABFA97C89CF193CDD98E89,8AA509FB461C099A3C1B806D281A1E1275771EDA0B0E3F7D95E0C11B3C1734EB,Signed_13652009334930799/shimia32.efi,32-bit,Debian,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 225 | CC5C7DB3068D99D6271FB38AB15B78C633C92249C4D783DB0CDAE2B918E97969,48F4584DE1C5EC650C25E6C623635CE101BD82617FC400D4150F0AEE2355B4CA,Signed_13652009334930799/shim64-bit.efi,64-bit,Debian,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 226 | 754952FF4187789C0269982D056F6A863409963F46D870C0A8D054E0FE69857B,B133DE42A37376F5D91439AF3D61D38201F10377C36DACD9C2610F52AA124A91,Signed_14173467011297444/shimaa64.efi,64-bit ARM,Debian,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 227 | A80B37C9749D6F2C2FDF64922A3142EB0FD63C72FD2989D7E75DCB4BE367299A,A8A3300E33A0A2692839CCBA84803C5E742D12501B6D58C46EB87F32017F2CFF,Signed_14173467011297444/shimia32.efi,32-bit,Debian,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 228 | 599A102B6445FA88392B8C85A31D80ECE950624219D846AFFBFB7131D4BF550B,AF79B14064601BC0987D4747AF1E914A228C05D622CEDA03B7A4F67014FEE767,Signed_14173467011297444/shim64-bit.efi,64-bit,Debian,CVE-2020-14372; CVE-2020-25632; CVE-2020-25647; CVE-2020-27749; CVE-2020-27779; CVE-2021-3418; CVE-2021-20225; CVE-2021-20233,21-Apr 229 | C3D65E174D47D3772CB431EA599BBA76B8670BFAA51081895796432E2EF6461F,C55BE4A2A6AC574A9D46F1E1C54CAC29D29DCD7B9040389E7157BB32C4591C4C,shdloader.efi,64-bit,New Horizon Datasys Inc,CVE-2022-34302,22-Aug 230 | 1E918F170A796B4B0B1400BB9BDAE75BE1CF86705C2D0FC8FB9DD0C5016B933B,E9D873CBCEDE3634E0A4B3644B51E1C8A0A048272992C738513EBC96CD3E3360,esdiags.efi,64-bit,Eurosoft,CVE-2022-34301,22-Aug 231 | 09F2E41661CBBD714D22986FBB36A2B5764A5544C85F9875D227F6A26E1C8C8B,66D0803E2550D9E790829AE1B5F81547CC9BFBE69B51817068ECB5DABB7A89FC,Bootx64.efi,64-bit,Eurosoft,CVE-2022-34301,22-Aug 232 | 51BD59697B4E1DF61DF32AD57CEBE394BE54E3E9DBFEB8DC00A3A176D13A5767,284153E7D04A9F187E5C3DBFE17B2672AD2FBDD119F27BEC789417B7919853EC,shim.efi,64-bit,CPSD,CVE-2022-34303,22-Aug 233 | 30CF3AD2DF14F05D89BC321744559E857055A5C84D7F0834B3DBD261ACE1CF5D,EDD2CB55726E10ABEDEC9DE8CA5DED289AD793AB3B6919D163C875FEC1209CD5,miniloader.efi,64-bit,CPSD,CVE-2022-34303,22-Aug 234 | 61F2D843B99AC93FA2ED40A50E5C3F0EAD7C75894BB92C32DF33052804CFB77C,90AEC5C4995674A849C1D1384463F3B02B5AA625A5C320FC4FE7D9BB58A62398,miniloader.efi,64-bit,CPSD,CVE-2022-34303,22-Aug 235 | 8CC2B48C79FBF5654B28B7BEEC51A3266E4CBB4FBE3A84F843EA0957683A1E93,F4DC5A40D2A9DBDAB210BAE0C508E053AE986C4DA42D68760A1655D6FBAEC051,mboot-official_arm64.efi,64-bit ARM,vmware,N/A,22-Aug 236 | 918871DEC65B4D8A8D0E29B221351DFEA3A1D9212A4E0D7EE692CC1696E9AFC6,CA65A9B2915D9A055A407BC0698936349A04E3DB691E178419FBA701AAD8DE55,mboot-official_em64t.efi,64-bit,vmware,N/A,22-Aug 237 | 884A2EC5FFBB42E948401E425123DCF2557664E77B3B7474A728069FDECD46ED,1788D84AA61EDE6F2E96CFC900AD1CAB1C5BE86537F27212E8C291D6ADE3B1E9,bootx64.efi,64-bit,Trend Micro,CVE-2023-28005,23-Mar 238 | D0EB15FE822C6239A8BB2B42FBC035D0956C72AC6FBD1429C1AB7F7E348B8F94,6A0E824654B7479152058CF738A378E629483874B6DBD67E0D8C3327B2FCAC64,bootx64.efi,64-bit,Trend Micro,CVE-2023-28005,23-Mar 239 | B97D5B2A7A9E582652CB9A9BDE1BB68EB631C2329168A996BD19CDD1499408BA,1F8A0E13AADE0885A06B5D822BB21D8111664C37691F0D256EBA840277511BCA,bootia32.efi,32-bit,Trend Micro,CVE-2023-28005,23-Mar 240 | 52FEBD655C84F4557DE0CA35A236D468C03FA3BD0F51F54C31B37DB29673DA3F,C4EBDC43048C43F5F11C59EAD051A3585A07FAFCE985CFED8B27B73A5492F9B2,bootia32.efi,32-bit,Trend Micro,CVE-2023-28005,23-Mar 241 | C6B0D030BB3E54294742B3914AE76C949E52A065ABB28D08054FDF90D7EED628,1EAED62C4ABCB2524643E1723F6AADCC31A74AF4D2285D3B13880CC44C22DEC5,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 242 | 355B0240DD31FAD0ED13D77B7F880F8EBB32BCC72F9667BECBA3263E099DF378,21F27D89F2E77DEE7CD4336E3A3ADE362A2AAE9FB2EFE2079491A518F3D51FED,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 243 | 9A395E7EAB9E7976B1C30EC651B05658D780897BEBAB8A664C6091742E592E7B,250AE0BA860D6D46894491D630D58B1CA008F695C92CE2084A295486F71F985B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 244 | 854AD42E44FBE19122072E177080C2AA9F729BFDE223FA6EA98BE1490BB9A4C0,399F9DA6CF5A87839637B55F62BB2CC6A93FA5AF7FE7AD76B4AF0FB320C98127,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 245 | 545C8C806D6A8B2AB307BF7FF5DFF05DD86CFC431D3920692E15E7928AC98EED,3B30C3E6A923CBB7CF65B539025F12B1C810D74480F25CBFCB9A7BFD633F06ED,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 246 | 8DA046540148E1E146DE2F96C7D860962ED059A923E9685E868DC4C6065684AA,3FE9F8D11EDCA3FC1899100484DE4CC2C626ABB38B73985A441B7C3A0D39CA54,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 247 | 905C2DF524E664759D55A6DAD4B62B58220ADC59FEC3E852964EFC2165B0FC0C,459457C48E1B450D8F22858FFB392FCA78BB6F4DA837862889AB798BDCBDF08F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 248 | C4081B588CA3FC9965C2D04A0E8CCA3E0016566CC8A84FEB78CBF63A4ED72EED,5A184E740657E218D635168286F0F70BB5672E4EDB78717550C70686C232EA5B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 249 | FDD173678810D9F9F887B428EB260CF42C837EACC41A11E89C08131E262E2C01,5E2BB7BC8B16E0B9DDFF75606668E69D76AF1219C17180EF0A5B9B383F00B995,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 250 | D1AF02FCA7522C8D27E053544B3B653FF2DAFFCAE9C420E460235DACAB53F7CD,7FDDFE06C44DC4302DA54577353C18FDBE11B41CB3E6064EC1C116EE102FE080,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 251 | B334937090AC1D2DB8FFFA7D6BB72F97FDE42712300524E2C89F0E7DCA5EF4D5,9141EA1A4E6BF1F4D72C28A1D0D124A928D5A7D36B14FC7E7E53EF442360FF99,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 252 | 101EC6206BC939A389713775B3BDB405E91252FAD75509C54FA1DBBE822F4596,93F5233E9970A7DB1E4C9AA2DE2404636728E7C66C03F2BBE74B18B20A93BA96,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 253 | 9A02C839424A2DB0C3B98553C179C0583E7B8760C7A061176F76B6970746B8AC,AE1DCA8AAB7C4BDD21C5AA19A323F597BD1850445D76695CB2910CCCB5F163B8,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 254 | E299D3CA4A5A6579E863DD54488B6E804E47B20B75B7E71DC64B47F6403386B5,BFCAA41445F20B54AEA650D03D7C39B77CD82A7A14824DC55AA587C4C0F742A3,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 255 | B65FE0AF8297168749DC235340CBA7C08CF6B956FDD25FC2C9F16D20DA536713,C3297E35C3A9EFC4C051706AAB77D29A26E62D9A38DE256DFFEB77A0EEC8666A,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 256 | 339E7E433DA8002B9FFB9EEB3C768742A93953509FC02BCAF95254228914067F,C875AE8A8DB5441A577172869A4EC6E71DACE7A875F42A2FBBA4B52F293499DE,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 257 | AB66D5C1C320900FC15984D7E1D44331411F2339DA9376F3E9BC2A4CB9B06014,DB1E5C6152A28D3EB6B1AFEAAD4974F3654AC6FBBE769D870ABB74EDE632B9E5,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 258 | 8DEB88A2435270BD24328760FA6FB5C77BCD5C47F7A0109F15300D644CB9A228,DBB424CB8AD35EE68546092645C4689D6027A97FEDF3C5AF842B9572F1276997,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 259 | 4489FA289C24EC5745E69F476FEBB3FA0103501D95349E795BE481E678429DDE,E11BDBFBAC4736918C497798D6ED018F529726A6B1894BE0658D1B9519538B22,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 260 | E1A44BDE59714FE31A77476FCF73CFB784105333F05755D8F1C05EDE4056D4C6,E637002526221BC32E477455B12F864F20B27C44679A2E78E5C56DA1FFCE8B41,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 261 | 0EF0AD66BA9A0C4E4815BFD072FE7E281DC382D8DE08A4529DF3FF997B19E705,F4D8EAD6C325030538D10EBB39F0EFDC2F553794C14A5E45F9555C335925D9D3,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 262 | EC89DDD37880430CD5242F5F15D13F4CF699F50DBE04643E5B70093631608204,F51BC0B8FCE1BAE71B76CB3ADE28B712669D4E938FD37C9F5872493ACC25FAE1,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 263 | 940A66FBDCB9A3BE16FC8FF56DB63CBFFD7283F15ECF7E50BD9BBAC7EAD303F0,FD4591ADD2E5B0664363720C71492982D5B223A141A6248246CD2381F67E926C,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 264 | 9E1E22CBF19E9A483E6D57345959A3F8862C3C98E2A825EB995819F0CF210F48,1364B7B94AB2A93E79D297EBF6CE0A30F7997E5929E408EF0D3B5D54C64E7B90,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 265 | E21231BE8A60E9FE94AD0D2202ED01C36E4AFC731A30659B8AC44C22B7377FBD,1510988D3DCCE120F22696A9E87B02E7FAD6367EF4AE8BFD54CDB528A5C48E99,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 266 | 3EF9FD0B7CEF661D5AF2971DAEF1ECC44D9210D33AF8C95E2DF9EDD694BB0FE2,3860B7C7FF6F4BCD5865843B2E86B2ECA5FF4FB071999F2129D4C7753B806F34,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 267 | 39CEDF83BD3417A90588795CDE2BD6BAF7089997FDDB588E552952C179958D84,47F7A5F3821286A9C677F66CFE2A84D5CA94CB6FC1EBE8E1986E91EDD58CBE33,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 268 | 1604F70608F964D1A835C3F3A421E58E449774F0291FF134AC298364E8E3F776,52A3CA4DB923C0648AC04BE86CE02DBC6A3AAAC8312366B106205DEC6E2CA2D9,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 269 | 9F91A5AAC09BA6E514DC37A013A68589DD22C1F5A7A539F4138CBC8ABC0A45F4,57692FC2B80D809A3BE409B44475DDED7225C76FDD5FF09E4ED7D330A58733A5,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 270 | 7AFFFCAF48E9289AA0C44566C53EC0A311BF3E2ABF351E0122C685FD568D97B1,7836465BDFFAE768EFAEDCBAA8B5787BAF51B2792A020E80E341A3F824FF82CA,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 271 | 81199ECB7A384D04F4E0F5541AF731CA6AB0A04F1E2D692B4C386E0F02F15009,7A0294BA07A2AEE3648AFC0DAF2EFD526A5B76349EC906F819C03BC217257638,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 272 | 3F5AFCDADFA8F590C39764BD9A31CE160FD7A929654491154AFD6738C0523D2C,85255700890931C5B71A73DFF09EA5125CD702EA65F45B4054C1463E00173FDC,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 273 | 9E14396BCA7712B13A5F0B209C8633D754AFC3BF577B42EF78304581DDD4E02F,8D5332B350577AB7B1987F93FDA104B2090F6A62E262214264F554B6163E8050,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 274 | 90EA447CCFDCD9771DE40DE9721D0256D6D8A30D68963E82485C2E92B7EB5257,8ED8AA03199DE7D541CCBB3009A2B1FF575219662D8B23FBA7FDFF02D80ABD29,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 275 | 5F3952CBA19C9F225AAE8B57E57C7E20505AC617AECA845A8B5CDE4994405C92,9335C9DD7001A2EC4E322AB6A2D11E6C4CD4EF1644C00D6314B7BA5A26F9EB7D,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 276 | 24C0732D77F6BC85BE8A6CA9B0FA3BA8611F950CA4E0194E972E59A433DC05C6,9AF92541E63EACBC5784BB44DB66F9B60726174F4EC178C6CE32EAF647EEBCA2,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 277 | 626AD87C1D3475B2599DFD36B430BE3ECBFED207A20D9FBAA01F7AE808C0271B,A4B3FEE324D25C53FB5CB48630DC80DD7EE78C1AAC8C8DEEA927396997E33BCE,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 278 | EA4EEC2975E4EAED0C5EE6C25C887FC8C7A0298FB613852DEC200DACD2485FD3,A983E73E57BDF014C9A29331290EE87DF37F97C81DBCC43C6C933FE2209C0BD5,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 279 | 02FF707BE8808663B2CC33286630839DD7B14AC8E2340F4661870B18A9621D9D,B420509D0D69B294633FD7AE2C36B2B549D45A6A863EF16843A1116A11127F56,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 280 | 9DA10B25786D8DB0167FD66C051F7E2655781BB561B99584312B439A32BE4C32,CE8C44E185FAAA03959CF23229607854EF7E316ED0773D66D7BE5E0A48061DE5,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 281 | 079A26143F5CD9862331F7C1850FFCF2D6E081FCFA8617F6FFA94FA212834DD1,E808A337ED6911EF561C27CABACABF4EA6D6E20FB70F5413B121AC251ABCC10C,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 282 | C2B1E1BB8F016D310FEA7225EEF9DC6B6F0E33E5C9DD74E9F24835DF6287296E,E9C71B7CD5A4DF0BA48D2CA48E6C468E657257F73F66017DE45E18EE746ED7D5,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 283 | 24119E64BBECB849FDB3CC3EF0BEE550248B13BD5ED5AE540A9389C7D5D7C8BD,FD3062358E0E1DC4C3A60380EF1BDFD4C51F4473B8600937D921DF472FBF9B65,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 284 | 4F9398592553EE138D8DB48B95789ECA19324B8408CAFD0F0BC46D030E7B4FD4,65625A143D220EA184DBD5CDFB1B9E9C3BD9654294EAA2B98628BC273EBC18B5,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 285 | 34F107AD8F982B591FB92BCC193BFCDBFF916C720BC69D96A0E9BD22CBA1E84C,800423CEB7E4759621A62C729BABC81F53259D95F76457224AD601542B7B26D4,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 286 | 25933D1597EAD1C390ABC59433AEC7C8F955C588551024C88C6388AFBC84ED40,0328F7DD12B552EFA7A9E083730333B85F3F4E83D39387FC531863B422F75CC8,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 287 | 7C6F0F7062ACA9C286FB921917747C8B65FF4A69EB71102B90C1570B4C521FEA,03DF4500273C43189296F09D734977C882A008FC056F43C309B9D2351F31792E,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 288 | 00550CCEE4EDFEFD7B7FB54864D0AA5DF059885E9E79FF80D4FB134B4487C05D,065D94B9EA00397A2ADDB747E1E0978E4DE6BF175339778FB9B0760FEC3D3B61,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 289 | 21BB3AD3C8E0198CA40E2636E5C3F27EAC047C1C0B39F19D81332FCA03DC4FC0,09F7699631C18DB0C33491EB4B3C65B8F279238C5FC5E3AB0BA52737DBBD26F3,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 290 | 8D76482F549D66048611DE6C4E67289E3B0BF051130B546E9A4B98B8DE0C4EA8,0A3C2072EF4FBDBF045E1876E855BB8AD5DD0809F66AD1442239A7D856AD908E,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 291 | E012F7C26EC6DE9D336AF7843DE0A4278D6191FA7989DDCAC40A978FD927BB6C,0A620707ACF23A4E6CDC357A1499E14852B605D9EB6186422F57D458E627D6C0,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 292 | 0E93C368F8177BC0FE1A09D79B897A94286F3C374A18A40522C3358CB627D7E2,16598EE39B716ED9E4765A44ABF86906C9B25C25ABF631CC78ECE6F7211B0365,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 293 | 376E727A97432EE289CE9485988E24C0E20321DDC45443D7916D20D9C8824883,17C2B5B96693CDC2951C89DDE641D14716063F5FC8795CEBC635378B73044E8B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 294 | A84526FB39B09F95A0A1CABE23D34CC28FA554242405EB653D6EAB8669B3C1BC,19F4C7030AD74035F5BC07ACE285BD7538F231D25787755D72071EDE879C6978,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 295 | C681A40CEB9F33F435A44614FB7E0D34007F1C67B83E8C907506414950CC45EB,245E9B81342E45E1BAF4F8D830D18EA7FAE9FDFF05497290EA6442C4EF0FFA57,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 296 | 55C6D083A4E3BE8FF842A5D39EF6F0C82D3DD29FE377C7AEA920C7B419F660D8,3153B3E305575439914605D976CF6EAD5A500E54D0B6ABCDAAFCCED1BC47E04F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 297 | C1136125F38F6B76285AE4F1A0068F49819CBB5B57F6AB85960640F93FEC21BD,36B7CDB6564C58CB54895B6D2C73F88D2908BCBD693BFD253945BD31E3EE81BC,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 298 | 1B455F745A6397C1B4FDFA43E634462EE1414DB21EF5A3391142B0F988F31FFE,39ABED2935891EEF96E2B733BBC6951DAFAD1A4C6B500D2D9B28C358355A6AB8,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 299 | A0946E9C77C27E5E9D19BCEEFE4DC147F97BF1CA7FE12F15280D390BA7A0D67A,4A4873A319A3A3DE35EA325771DFFCBB31EC14550A4E029CF0FEB9CD686B8C92,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 300 | 3927727EB2435B28D2CF0CE1757E72CE3E92A86362B87120040C744C1C08BCE9,50871141459A21FABA3DBBF63DA5AAC8863FA3D8A9891F182ED72E3A74B64FDC,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 301 | 5052CE3B96DB73A909BF0E54355E357F8AB7284FA48F9B21C85EFEDBB886C100,54C7D9C28672A1306E43ED7FEED38B295F8EEC279251F996FA293F68FC6CFB12,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 302 | EFA5CA12CFC70DEA81EB71088B4BDBD44D5B45A8F8D81B7DB243D6A03A7F11C4,5EB2C76843B253ACBCECBB84767697128F000C18358C78C5BAF135A5996C037F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 303 | 77E2945B3A2B0D14E9943F90DDD7BB87DDE9CC5D8BE09F9693E9F4166769363D,6582DCCB8B305EFE0BBBAFDCC7D295A6A8BF1DF0397E1A8AC736E9098A2A64C0,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 304 | 97C24B65A08878AEB0002FC577B717A950C0A20E60EBDFC569637EF57059A2BE,6730C911E6D91009420D202FB6F394568A06AA97E9F33F30C7E92AAA71332D68,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 305 | D038EEC123E1E13AB3AD27534DE697C9779E9C27C62575F06771F80D3CBB7148,6F53CD5BF434B19B4E14CA127C596752079D989FCC98BB7D7CF3155619EC347D,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 306 | 98A4F01BD9D8A039C669C2AF9082A0EEFBCEABEA4C739E05A1D0C59C5D851AD1,71B601EE3746DA7177726DB84F5B417C9721583D2D88AD857BF368A54FF76BFA,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 307 | ABF6F968CF9ACDDC04BA5F287F857551CC9D3237CE402D527279930AB5F84894,77CDCFC9644F8F80FF407CDE316AC235DDD1ADA9C3B6A5AA9544DB2D64B79FED,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 308 | FD69741DCD1BC0D9AB8A02C2A7EE8D466A58613562536AA8AAB5EA260BBDF9C3,7C09D8B90B72B7C2CCF1A413E335C2D1A25D75BB8541F9BC16B4C4E26BDA6855,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 309 | 7294F03850C2084A287FAEFBA778592D9D01E5062DD2E980537E39FDBFE20316,7F964730CFB7B8CEA284E2E810212FF9B0EE18227F64427A095D6886493DB0C4,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 310 | FE26E6C2BC5AC4357E6657624180CA1E946D6DABE79CDB098D7B8B4E440851AA,84D75F7A8913D66DB946EAF1480EADDEC3063D27A6F625F040B406718ABCAC44,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 311 | E082E310571748B9FE6B2DFAB71550530F2452B8E7E4F7725DE7EB9E4C7B1559,87176A15E766BD06528ED91A61481C3B3CDE65EE95115403F9FFC6D3A26D43D0,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 312 | A37FF7C979ED0E58633D61D00CDFF45A2488E86C740240C77834C8C8C651CB19,8CB4FDAE88F4F492AC6C87716602366DF1AC84224B85AB2D3949F5AEE79CEFEB,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 313 | A8CE55447F57564F1CE95A7B3C505A7996BDAC4A06710DD101ECD5B818653E27,90A483526B4238C55BC5DED289D7C1D376109B9D5F3E93529EDA75C4D451523A,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 314 | C9F47991E981394076050CB8B5CDDFCBF9FB01B6D7272B9079082E20E4875CC8,915009D1CF9D68B9E53064DE82D4B70B58D2F014A03805CC406427D323D9FC35,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 315 | 2B2025F4C880166D94222A95A88FF0A525C361D7B2C8A886B4E4CE6FBDD6520D,A0107A564E93989C57044FD18AA85BEB1258101AC3D9F6E10BF12C1C6573BC2B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 316 | 399BDFB85E5A072F763B3692AC5B34FDB00D7C5DA4180219E99A2E0693D72B39,A330FDE65C067A5F0B75C80D0A300767C301EB75E0CF9B4EE240F0D60B3DC503,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 317 | E3946218D523E5D20C99A9A5BB22303DDCEF958DE2A978E01AF2F46D2D7A4DDD,B149B29E8211E24827FBE0168D30CB2619CD3365BD6F8173E7A731C5F702DCD9,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 318 | 53AF0DDBD3C4D33BD003403D8C9B41877E07770D3E789C781E5897858585E299,B97915DA9F05277FA5687F8C41132DF69152517F2BA252D466395B40D4F2D155,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 319 | CF61636CEFDF20CF4B35382124800E047F5886952888BD41D1B8426BF34D2D29,BB44FD8CD04ABC3B54E5CCEA97EF81E70FD3933C34288D8B86F6ECB4F3ED1FDE,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 320 | B15095CBB09505C8354657EF7DF0FA4046F5F9DC74B26EF12A7D83E82A718322,C1547CF902570207A9694B6B8E353FE41419DB6A3802221DDF10FB8F86947804,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 321 | 62288F1F5F2F8529292EB45C2AE2A33D1057A3DEC12164958E76DED36FBE712B,CEF75D1DA8E991AC96D36F8A14562849207F9DD50FC63028BA83277D5C27D00B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 322 | DF216FA3F13F8F7472C9586DA4D0A7CD11CD60A041F486A611A4667F1C3D2CC6,D5BC11FB619BFCED64249B930C785EAD5FCA3927F0CE3C5EFD3F1D9AF04B37BF,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 323 | DD3CA7C4BF6698E7D72F6C2FB0EB59997336C294D604062EF495EE8E1F49931C,DA9943277174960B0D7D3F0D656176F3723ED2F03A90518BEB3C6C202B88CC14,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 324 | 573D0A8D59DC7FDB0BE784ABE9B51DA9183848B613FF4C96B143D286043B4E43,EA9C72C1CE865E6044ABFF576FD712D4DF3F5114318753EFCFEFED70EE586884,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 325 | 3FDA721BC5007EAB23AF6E0C56A6942A7925A858F0D801FBB21011CCF758893B,F1CAD3AC005B57D6E22EA57B9EBE1EE9E5052BDDA499F5F2C1364317DE87A794,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 326 | 3BC9ED257486B68FAC5899EAA19732A1340D06C8BAF4B0FF53C7F5C052E6470F,F74947590A87A005023E9EF89CDF0C38D8D582CA4173F8201CEBC443EF796790,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 327 | 271A4B174838286F6D4BB9FCE91A47FBC87B28BE586744BD42CD82CEF4600B72,FB0BBC256AEA5CF93DA99CF26481CC42F4E7BA6B32DB63B827620807E79E805C,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 328 | FB03DB013F31A9AA909B77CF510CD129B9E857A93E37BF9ABB91A79EB296C758,0C0C78837FA767EB045B8199E1E20AD666F90928DAEEB8F5E5253D8E7877FCB4,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 329 | F51C64E1690E8FADAE2C55EDE85377D6680C337DABCFC01FF6CF37D8D87892BA,0E44212BADF40D6B8DE3311E632045370588E0B23B7A480EB5DC10DB65D1B4B3,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 330 | D6D10836B79E28ACE9E2BEC7EF9B67DC736ED6C1C8EA24D395DDAAF05B76CEBD,13DBA28447FDBE3C8A24FEE3EB88638CE1D8F97CD4925056C0AD0E91CA51237D,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 331 | BD6E8218BAF3A86090201D6A118858CFA5F63AA2732CC880DADF39A1609F12E3,1DA53F3A2C7C41C93099737266B5619FF616A433FB3B870234622D7AAFAB9A7A,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 332 | 31DCD37C53CEE49C1241978CB976230EFDA89A83C3E3DBC18EDA92099055026A,23FCD6BF3084CEE6A9F9885E5239230B0ADDE0C870589EE461551D1CA8F4E85B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 333 | B1EC3A20DD620668852C057FD33023CB945D35122C079F13A59A73F8A4E4FC12,264CBC5765718A0BCCB0F79C0FDD133A898203FB6F4F2052CB0647FBF6000ED0,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 334 | DBEEA13BD8FC4D613501D8CF564A129A541AEE6FB5AB82CB4A5F448B52FD1C52,266C1429C8DC389481B3814BC3AF8723DB28EECEB0BB026BBBEDA0CC41D36BC3,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 335 | 12A9833615CAABCF4F732C8BB088C83EC18C286EEF2332CB11F18529B676BD38,2B1B9ECCF585B11C5122651D7B94534BB131AA7C874E2262038B85DB3EE83E4D,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 336 | DA9C62E148457AFB0629FAB0C2D58623F9AC35A9A95EF23388ECFE85451C60C0,326967C7FFC1B86DB8B32B0570E88A89CC1534CFCF300B98C077E473F9B18FA1,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 337 | C79381B9A5D1D2B8A85B6A5B2255923FB2D3A5F500CC00FBBCBF10C6A3A0B40E,332450890F9C8FFF7EC15C53921BF27227AB9EA06B0E1C816D819F8E21CFB55F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 338 | 41607556B9A25F6F3AB73331589519553F83D2CB3629FB3E729303898D173023,3B7696DF627ADE30BB15BDC5CE3F3C27240C973353E8551E7B036C90D01280C9,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 339 | 79631821A585BFC9A9A5D2D92D37714EFD84A3D856284A0897654461EC1C137D,54061FF50D91296F2F44D8B338AEEDFBBE86DF49DB5DE8A45191AAA931F5BCF6,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 340 | E35CC798F138406BDC5E793574F62FE3BE4C7DD6424AA6825E6EC7B2A345B591,586898C60CFF539B76D23DBF2C92E4105F6A7549E13F53D293708B793CA90D2D,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 341 | B7313BE4901F1A80F84E4E8A6636F090E7125B97FC845D4454D5E4BEF3D40CA7,5A47B0B11D2FD9CD39C627D1E6BF4AFED9601AA15D6A5D84FB10F39755D2D323,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 342 | 669353CC31E65F896A755DB94A045D9DC1B4A24BABA14FCE11D623BDFACEC78C,5E67BF240B1D05F6F618908868A494C50A30AB255B06619FA28411EB260F674A,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 343 | E443176D6A0621E65CADDE51F4019EC7FB25E91FA87CBB6CBAF09D94E9E49918,61535CAA144761FC48CC9D7A835DFAF020B569EDFC7FA628F983D58A3AC25F2A,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 344 | C1B24EBFE119C27A2E5EDD4267EEF37B2CD14FBBD8688DE27E08AF89996DB468,691BA3414E78622581BC519BAF0BCB16FB262D3ABBD8639F3E0ECA2A29F99406,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 345 | 566AE5FB2F355B2C03ECBBAB4770E92856B0D1C3D659FE0C11263F1A5F8D7086,6CE1F2986F0C46683BA07D296D0A84448ECF76C69DB183FE29C36EED8F8E8F2F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 346 | 0876FD237955DB876744D5AEFBBF0DB3771AA2603233E123B39F4E772FC3B457,6CFDDB6203F254D38A5BCDD4173D51647A487CA70AB21326ACA0A03BB3D2BAC0,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 347 | 3F28C4F2FB32C10E5FAED1DEBF7DB6AE8C821BF286FFDB57A5B31FCE0730E111,736AFB5DF29EC9C88532BE9C620EF80901BF23E72F2D3488B757AFF17E734ACE,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 348 | 4628EC2698CFBCA38D3BB4872DF8E65A370ED4591E3FBD613A28B394942B8976,74B39C206DC8A11CD196D5998D2996B6AD477D72EAF86E19A3DC14EC0EAB0F1E,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 349 | 4155DCEAAF889DE79ADB9B2130F1CF23AADD24080C2B2C1EC5F4C359C52A8D7D,7C7372A60D71E04879B8930C164944D96D3753E0A2924A31231D1D5FB97882F2,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 350 | F025A519DCCF1DF41951C22C6DC5CAFA61E21B117E174B4983B45CCC22C6375F,7F292BCE8DC97B601EF1EA72BDF7D96A12A87782BB1B1C547F85C55C7B3FF035,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 351 | D0A3923ED57307BBDDA1ECF0FF1C40F478DD6F439F80A072508C3551520CD52C,812EB0FA2DF13A889549729CADBF1720B68F6C9E21955741B72802590AF1B5CA,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 352 | 764D5B7F15EF539E0C8685DF62AB7CC7DBA3FCA50A08A8F7643D108A0A7FF757,815D98AEE498CF27FD6648C7E02CFC0A4A88AA73237CBB2352FE38384A72683D,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 353 | C6C85806905E0B76C25C82A88BFF62B995F49124C55413E74D1DCC3461FE8336,8A305C5FBE7C56F9E3214D7ADB8F176341F4020F234F3C14E52335967A2D365F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 354 | 9C1812CF5B1D61DC08BD6683D143511BCB5B14798116D1D2714963CD468933FF,92185C264285741FA7F198CAD8F307C60891AD932D9E3C2A08D92546FF7099ED,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 355 | 53E9CF33ED9379862E5A5424E0C3FBE6D81D0D622368F773C81658F408A642E3,92F858F6A02BD2014618B05D7759E34E7781B15C34C8814BA4C930B320F8DB09,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 356 | 413782A6CEE2CFF718F87A737CD989E2A6067E67212B575AD8A7D80B1A62F206,9414F5FA5853978C07FC6BB17A1CA9460FE443FFCA021FA52C8672A94460F44F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 357 | E28C1F6E413330EA1DE56643F344702D2962988ED72AC49DC7B33B51B2238537,9EBDA9554AD5BB9E3D5CE700F7C86D4F5B0D782BF1DBF30A6A7234749A5DD517,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 358 | F4F5C82CD7BFA5294F973385F7F2FBCAF3AFD3748952B06692C085792BE146F7,AD16DE1E2BA27196395124683B80EFC186EE7E51D434F8FF67D973F46E8E602F,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 359 | 3EBB964E2D24C5D0F2E07972A9F143B73161344790E960463BF9C229000848C1,B4938ED2FF001B73EF31E5BBBEBE1D6DBB7D9888A9FBE5251A52A5ED016652CF,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 360 | 4F3E97E36EC05236DC378C544310A9685D57409B87020BEE731D7DDBF90987C6,B67DB8D53C925FEBADAFCE4356206C85F73E22456EAE4ED6EE77F6A9E11A078C,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 361 | 462F49B4FC9E4CE706D668042EB76F711B4292BAE2BE8DD5897182B316EF217D,C470161A06E6B452253A623536924979CDD11838E08D8E4DC86F763732E64B0B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 362 | 8E5609A57BD66CC153EC2AC60CC10C2E641334C26EA5068C1FD8373A503EF1D7,CC7396D1C306ADFCE49E70D7DAF32D093A8F2FEBE2AC0576BA853770E11B3EF2,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 363 | FEF56F20EF6E5065ED0FDE1D85FD19F1F07212403489FD1E2B63AA41F5DC600B,CE1AF9FCCE6AD19C00D8236B23B03CF83C593C6184A08266E58FE95C6CAA4D13,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 364 | 4759E0891A636E1A3D27472C48AF55F27BF5E3CCF474141FEFBBA2AA124AC410,D417C004525C7BB57523836278CEE120FD66147983BA738AAC011E24BE75E6E2,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 365 | 165A5DCDEA3A7DE7CFAE38298597445EBA59282308C7243BE50F568AA610F4F2,E2CF881CF07195454505047D74810ED79AE20DFD0F1593AFBBF08270A486C038,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 366 | 0CF738DD9BEA4F3BA350C805AE7A59076147080BC46F1D6D6C994382E77F8486,E7D9BDBCC68B5BED590C29B72DCA2B96779B8B68B12A47DED074B8F1B32F8FBE,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 367 | D8732EB8BD7240F17D90656424AABC0669C3D13E3117EFC4805BB59DD21CEB1D,F197A171A09AB640AA8AC4FF7DDFC88377A89FDBB3FEE014ABB9097D92575B67,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 368 | 6DB28A61DEE4A1209B94F5C984C44D9674F69EE700373FD7BF1A3CBDAAB83FA0,FFD7688E7D2B8C3C3140B415E728BBE7663C54E23BD288FF2CF4617835088F39,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 369 | 4B0C9083430D91770BBB629380DB3A2A89DC73BB8DF677725668F727A2C2147C,450EFFC827CA535A79D5C4FF3E1A3F614CA9126B3792F997D38791CA7399320C,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 370 | 783D088CE72996A064C0DA796579475E0AEF23C5E6E0E5905C98571BF8620E20,8EDE7732284DAB4AA384606CA07BE29E72FDED094597261A2F6473494A8ACA0A,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 371 | 196243A87389B47FC9033AF3884F3FF0A5C891D80E22C82D2ECD5B9A3434186E,CF7F9E7D091023A1A1C3F5CBF7DDACF7B18F03A4D07961F71506FE9DF4388EEE,bootx64.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 372 | 0B16AD93EE38243D72FF0ACD790107767B6D7D3563A4BA8EDB7A23EEC5C8D531,2B21029FA033526D1DCD9E87AD8893F9B5A08987C3271B8A86716865DE53D958,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 373 | D19F5CAC6AA761C1F66C71B9B7A2D44DFF216B97BE10F66180F5E4EF084C9811,13A1F37BEDFB5417B6B737E2A3816C8FD587D74D836914B2B2EDC9FD6CA30E58,bootx64.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 374 | FB2F396A01911260D4035CCABF36DB99081DA3F8D98BB40549D7D5E93CE4EAA2,ABEE522892FA10B22208B4D1540184617BC9875C9E03E5353B4FF476577D918B,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 375 | 106E99968A816752C4A0F5DF6AEACC0400C688DE35832798029040CDB41E1F09,F254087746FDB5D9D9EAE6DF458485752BEB0FCF295C36D273511B45F7480287,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 376 | BA8D25B9FA843DA5A70D38A5AA96549F2166E2F0B4C1C007AF8A07D07E98A528,996C1D55955DFB3698869BDC2A700E6BCC762468716B5CBDA7295CF98841220A,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 377 | E438149CA86CF5F2FDD1318BF0D6C301593EA74B06940E031964F34561255BC8,6B54497FF9915A6977428BDF8F45B116D874C4F8A836B5BDFC373D05F4C0EF87,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 378 | 6A7CD85A11D733D1D03A01AAD914A3F22C33AD9590AB27792D2B177E0E51D896,6D174DC1673F7CFB6F1EA75D71739AFDE2B784E214E41AE6F5AA30F622A400C4,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 379 | C8AA71C72318CA43CBA4302FBAD12B474E7E4ED1B0EDA8A48CD71343A32FF155,CB95A4D2E0E02A5B56D059C9F223C2326753EA8C44D2E3FA6C4486629BE387A9,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 380 | C655C36EA5160603D4134B038D732604394031E177D1C32CFD582CCE0C037887,DC7CC8D1DC11E304ABDF6E6227838F35B223B780F030DE7B341E88A3F6A361B4,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 381 | A6E8C6906E4845A30A036FB669BA82146E334908706778AC569DF45CBF8637F7,8806CF0C7BD5DF7E01D120F56734113BE916E183755577BD48026C25DB268680,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 382 | 59E4FA86B1C3BB7DF3CDB79A17EC36AF9AD12E153172F6D8E662FCFB9DBB37D5,CE65C29521CD8498FAD962E5F70D55C5044366EC09C761A60CC7C4A2001776A4,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 383 | 64604EA91F31B815BD0219D56563B9C2D307FC6C71ECC38D498221E0E0E9C4AD,2992068E4F616F2D7253E9D58116A97F22923F4DC1B78A58BE4499B982ECF270,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 384 | E0DF7CE01E42A61228F4005FCDB9C42675FF7280A0BE9EC1C32AD9D5E0493F10,D87817F76309B1E420547808CB573AEA0C8E7DE14123793A42388582184286B7,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 385 | 71083EB4F247AC78F52AA09F81054396A0DAC1064E1191B5B56A43A6976C5C74,CC202E8F2753EC75C9EEAAC65C9D39EEA6FAED570664E930E3815976CD332D91,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 386 | 593148805FC70C5FBE0299A185DD367DF00A8E7AA95242C90C6567A73C1CD259,7B94F0505F37B19B432ABA08BE2E3E003038C02CEB531E169D460DB60C351649,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 387 | F6208932ED98AA64F5EC0D9F59138D4C1DDDBD82437315AAC4AA913E5D4F825E,CFD2A8F23BBCE7424F4A6E27DEF368F17B086FFA226528900FA092736E705EF9,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 388 | C643C3CC182443893728101F5303AAA05B08EC8616310546EDC903635C692B5E,F0B3D0D4C5457880E2D9B7728EB64BD288B5D4A26EC883F3C0941D8AF29D9466,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 389 | 990A4DD8C86392421D680FA039AF4E88D1EBDC97F61A73F8347D6B314FE8CD51,E8818666B7E014B6E4820AFAA84D5A84FA42CB5D2663C848D358B2913274BA21,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 390 | F4C53C0B054413691BA25A2D162BCDE9C9E35B5E706272F70BFF96ED5C05A7B8,21554D1F3BF9F52D3CD297D27DF56215C0FD08A0BF673868F3D8C6C064DC5609,bootmgfw.efi,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 391 | 0B753BD95AE643B2543F501533CA54DB34DDC9D20F336358067A7069240A6214,F8F38C4FEBE9D8E45E71A459C5BFF171755C348D5F619F3C6EF30A3F8FD02BD1,bootx64.efi ,64-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 392 | 3E73CE2DF3D7B01132C2ED47BC7D1B28E421B0600F0B8D4DECF7F7C23E83EE1B,1DC8A3F59B23CCC411D46691FC9B5C35993BCA20E7E2299F1A95223B9F112E43,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 393 | CB5C370B7BDC87A2153425852F477916BA3B13E4C62EA419AD93DBDD34780BEC,9A22818E84CA5CDEC6F7FDF0A10B9FF230A53A5C18F4E9179C90A3FD268CD622,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 394 | 4A62256316FBC805231420BAA4668B26023AE08B1BC7203A71C28905D19C817A,9DEBCA159F7892D56C94614C469CF37C8DA035683B1251FC4E6EC0EF2EEE720E,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 395 | B81C6018141EFC89816DA4081BBC1414911125D5184108E47AB01260D84FB9B1,CBCBB8E81F1CFEE4D02D65481080ECDE62528344C5372B09FED4EE3CA1E14330,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 396 | 67D204E0E5DBC0C5B2549FC2C003024525378DB4DE12E5CA1451DD996561AED5,DD5E4E9F20CE8BF8F3512261F176ECDD046C079D32585D9B259AFE0A28C973DF,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 397 | B28C498A7CD61006A32A9EEF404AED4349CA68DC6F2240833BA4EC745D37A1DA,E6C63C984BC754736376564A8F9AB1B7885B9AC2F49F1EC6E4053049D26F78F9,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 398 | D2BF5E584EA2F3844B27CEF320636D1A2CD6BFB023ED65110FF6D0EF09292114,F2A74464235248EA2A41EA0D0256E9CDD24BB6B3E2A6F2FC7E0AADC86EC56CA1,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 399 | 575D4DF1AFBDD514A6D293234F4493736200E657D0EB9C618CBE18B3AE8EBB3E,F558E04EF99B39A1012E8BC2685728D983C682CF5E6F7E4D335A660283D7C666,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 400 | 79BAFF384ED507030CBE328A3D6C04D13E77932F08D387F76CF2422FB3B2588B,FC736034EBAB004776581CE9A6C112106DFDDFABB315B1F0A4D0842D67308429,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 401 | B6FDF73C4B54F57935671B1C6F03FF5F104F8092C72574C2DF2C6FFB1E5F2E61,0CA5E602468258B0685A2B2B7F028B977354602A82ADA86C9919FC472AE4CA40,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 402 | 34776096730EB7B0CAA5415414943E2C31AAA464BB545FBCB8E341E7EBACFAB5,1A74740EBBE6A0E7DD44CC3D8E29F8FCF42B642298A5C5A586D77BE0DB15C2F9,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 403 | 1B9A8D23FFC211EFF6F12D17037EB076EA46562DEC937F44CC49D4AF1C119BA0,1B9A8D23FFC211EFF6F12D17037EB076EA46562DEC937F44CC49D4AF1C119BA0,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 404 | 52D826CF8F6A0095938F7069B5F5DA22C16AE037D757BF9115AA84920BCE4EBF,1FB619FE1504EF78C8BF59294B16C6D9BF1DA741FB582DE125B6A044F6961C57,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 405 | 1B9401C47B0837F1FA315F2F29F304ED360B5B2E2843141367562B60EDB1CCA9,2116183BBAB5D6964C001C931A09ECA1DC0FD6651A61BE4A8A9548DC476B90B1,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 406 | 513310D70C03096167B915705C9F0CF34B2B62AC317AA3F89FA5CC385D74DB54,22C3867606A625048E1D9D5230F07FAE41E70BD08EA978BDB37563C0EDD9DA03,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 407 | EBB480F63BB81A4C88F42E97A1B40DAB2EBB926A358EACC1C52A5DB88A2BC6CA,28CE0DAD50730900C5D18CC58D5255293452CA37D764868C16EAA9EAF6BD7C83,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 408 | DEB3FC384826610AD277DDD592F6CA8FA9D00E56457724D470DAAC32962532F9,2E6921DC970AAC433DE9AE4ED66B2681A4CD2BE649D2EE9A561871C335E8B1B7,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 409 | FE4B7349F21EE077096B6986693C3F250758C5DDF96C14AF4BBFD96EE74A70A0,3A9E49E6E644C0ABEC17D32D020339D171439ABA327409A7797E6686BD0F641C,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 410 | D76281DD69E992EFB55604A1B4E6171E552F3B7E1411D75368F98EF91ED69E21,48CDB31A16D891124BE77490FBC2AD13CB355A18CB0007258CA4BCEA44F288EF,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 411 | 89C7492FAA5DFEFFE4F126764CD556A82B53520404636BD50C32405346959016,4B59C6D8E94428C4CBDB0F306FED75B099EA349431F001AA819C3BD0D1600812,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 412 | DBEB49F986EC6618E7C256D3DB4E3D5378A6EE3439C5949AE57E12722A73A198,52CEADA58E8D14AB47E706DCD6264D82AFFC0F9FC62AB46F77BE46F262AE1B17,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 413 | 176693F4060E5330AE384BBB5470A0F3C936EC725DAABA81D5DB2B820141D282,633F9806BC96A831CC2C8D521D71E9EBD02180DABA1A50978EF6B72E5034E9EF,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 414 | 78D6FDE56994BCF26964ED51DF446165DAD66BCB0BC6792B9EDD2850F19DEA4F,64CCC886EB99C30AA808E5CA9BD371577BAF9D3FA0E450118464F514B47A028A,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 415 | 6E90699DC49B40F02790D085E3A1B9CEB2F81D85F55D2054163B3432FB87F59B,6B8EEC829F0373931099F070CBD4E2E1380CD5644201D05D80D86B1E7ED0B08B,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 416 | 268CED16B53E3430A28F1713A0D155A68BED89DB264D8D8170EB6BC548C9424B,75E78C197FF91F574735A3A606E56862E9E0B84DF0CF69F7C7F43CBC171AB371,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 417 | 7429F9578205C654FC25D2FBE8B6F27D8082E049A962982EB70F55DCA02BE882,7F9602C123A090BB0C4C3B69662BC52D675A0A4ED444D1C1E0E26C2B0DC3760B,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 418 | 9A59A2B53C8BBD2E536EADE26F26F3EE61129AB027812922B52C572364465E8C,7FC7196EBBFA0D7947DE66F37158DF23821F156F724FC3CC906F16E8EBFA3E9F,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 419 | 57B017C3A6AC4676B1852E407297158D1D471373DC299CF557832D9E3F13577A,8055EDEEB18561927DD5956BE9070C4503FEC783AA96F166F5F93FDBC3C2AB43,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 420 | C1D93E3D7F580616051BC1456083F6DCC80DB4642E7AA2909041E86F8209583C,825ACCE0634B91818F57CE96B8314ECEE7373BD20DA77FB08B9B96D66EB65145,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 421 | 76AC59211DF73F8BC0F1369CE290BFF57AD705CD1EB3B402D19E12FE5FFBD6D6,8FDB0851B7639B3293019BF0A8DBD6B7DD57910AC0CC0224852C3381880F2A45,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 422 | E23336EB1176965193B9733A01F8B7329DFF26D191EF427DC06ED89DD439C615,9E08464CEF9931473C384DB77278997AE92D50368C8D2B9D6AEA6E3323A2BBE7,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 423 | 7384B867C248569C3DB81E82AF35585AB3108858E958750098F9D8298CC9B8F6,9F2B71EC2FECC93E4EDEAE24B32F8857FA36A81A7272DEFD5435D29FA3BF828E,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 424 | 88C2EAC45B9480CC7E423558BA1B90097E8F12DBF98F4628C7A574C6371C6030,A22471B1D04C11CA895E8C078C221718C96C40309D64CF84144759CA7DFBD0D0,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 425 | 45A04261C55E72E48C90A5C821C3A519B4A0D9B1A6C3561CE7477AC399D23C5B,A372DA66E15D456DC4200BD3908E0943BA4EAF864F7A35062B6B1704320D090A,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 426 | 65FFA344151D7347ABD0DEB599086063A503FB6419BE9E4358851F6B6AE96749,A7B788A7849607348C0DE9041989F7D67EC302F0CE8D7FDE5E434801F012B5B1,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 427 | F736ABAB18FA867218E4FBFEAA8A452C3B55F2981CC7E27E6CAF1FD9181EF294,A9CE2969A83982F80B6B2685568A7D6F8E58BCB5FABAA2F8168092175518A0C9,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 428 | 3E8EE29691F1F22F5B46C301EDFE411821D466E7A39672A416E387060A0EEFE0,B2BEAECAC1BDE409F82933D80FA3BF5FA0D1FF8D1F97E5260BB25C0FBBA35CA7,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 429 | C190FBE65C28E7DBCA5AAE188C368CAB9A43ADB7F3B010843086D6DA77C3A6E5,B344D2F33E30A25EB927E4C1A419D019ACCFA8249A5CE622B8E7C7D8D5807A00,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 430 | F64F70D1D3AD35BEC25526472C51765BEB40AAF72CA8EC1242E046F62C18C11E,B3EAFDEB6E2809BD72730E4FC7896B9D94543CA360E9629B63C039FF91274BEB,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 431 | 50A8B3CD4F80C8C27FA47242869FDE8B6B7709A8AD1AF0EF0A726D20623007D8,CB6722995D4821AEAA9871C1B9782A02ED2F3D2BC6C1AAFD3E6B7673A210A8FB,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 432 | C2D9AB79B0593235C5EDC3CF77C3A48FCFA740D804A0397B3D9BD9AE9EE516D4,CB7BBABE6E9A118C420BE4294132A88BC494969D95B9884480BD4F68AB94FB2C,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 433 | 9CD99CEFF9B7496E7B6720AF4C561668D6993376EC18593E3F54B1540E5B31A0,D069A07B5ACDE004FE7286558041F1F123DD88BB1395E5E453F62F48EF37D199,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 434 | 1EC66D5D99383D9EB6CB553965D6ADEF787ABDDEC162844AF1CC04F24EDBCE08,D084AC3FCD80893B1878653C8BA9B71FB9C53E25843A989EF51A9B44C7EAFCBC,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 435 | A84FFCA344A000BE6FC526DA7D7F701B87EF5559A71D8E63F806276E4D3DFE27,D759308D047E9206006B51B5770FA25EF5C124B8ACC6B0139F5883765FE30DEA,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 436 | 540CABD0862F121CE200DCEBB6C9D3B209B266F0CD413CEA2385886F965E5062,D860D3DC4D9A412E8FE8036100BDA7637B57A0168CA811781ED4A00815A97E0C,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 437 | 894C9E5370DA9DF83426F92C42CFDC5D79CE004ADBD45A7663E9F5E9A6A198C6,E226D6F3A332238FEE8A42A8FD57E8B009725DB5F8DF4DC1CB54F17C6F47A9C7,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 438 | 860C16809E3941BEBEDFF0BDE99C32AA77379C0BE1F6B174D20038A02162D3D5,EE0A54E2DD9848D7A209D2C945449A0BAC9A46C45E5E033C6982D2924839AC74,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 439 | AEFCF3C2010344775B306EFA5FA4A9B7630AA95DA5B59C4E96A2524302B51E50,F330F23C09772A64E1478A19CE003FABCA4F52A9431A8C6803019AD532D7DDC8,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 440 | 37CAA54424C152D84DE63C288DF7CE27BA97B8671CF27DE4101066EEAE8BE90C,F3D38950A3CACF61C94DB9153576194E953B5785637159B3AA6F1E923220EAD4,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 441 | AC22C4AD2E62A3A8369A311B69E9B3DD558359CB44DE8115E6BEF2AE5E5E7151,F923EFA6615CE9A93E5D69963B30ADB00F2D2059113F55BABC477BA889841F29,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 442 | 90AA7C82344C06E7657FA919AD2B7395A07F8A1ECA8C159029569BD4467CC7B2,C32E05EEF54D7EAA0DD89FE0F4D1A8D97671FB456F6299047C3192C3E3724BCA,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 443 | 997CCF341DBCE2EB9E119803723130DA90E8F1DD167A7B75400E73CBBADA54FD,A5E0C1C1FDEBE61C4DDBB66C57EB23BCAA86C36BAB9900AD10342A4971128EAC,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 444 | 0EC7C340AE2DAA6D5F7B261BB64A5E7E2351073FC5B893E07D03595DEE28F544,26ACA3C927095772FA26A4D63680597130AD161EEE8CBCE34B59E10C6167E92A,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 445 | E785D139C9F008F9135EDFAD44492D11D09B83373ABE74AD45B7CADD25EBB464,8A03960BDEA6A4953AC50A2BBF9317BE228C2EBBC299E1E90CC7C6EB18F43B94,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 446 | 0CCF098A0B3F109F35C763E69DFA54190365999A78707EF63863A812C1C07F9C,1F535987EA7386DF6BFE75F51EFD35E4D2DA4B002DCA2999C0CB4B767BAFAFFD,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 447 | 73DD7327621AA77D919473F71D3175EFA40F174D3C16060C079CEF169CC51363,7D0B74AE42DF73A0C2C9CA64F6C83813D3D6A5C4B02BC47F566CEDD5682C691A,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 448 | 4640438E0AAEEE87664C893198B41AA03BBF3214E181AAC4E2DE81A5400D2C27,199F3CF990816D710F556722CA068597C4341B7F346642339839AE30495309D0,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 449 | F50D0AAA4875B0B609D0F796AACB77D582E0246D3FC544F76ADB73B67A156626,4A9B1C438BC8F114BFAA82F5D533DA31CC610C276711422C74A167B8AEED7C82,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 450 | 8536BA8D9039C5F91752BDC45A7AD2F91FDA2334363850DCEB38FD87DB7632E4,958C0DB651F4E4CCD062446263618C877910E08257EC6D9BCDD8BF1E33134FFB,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 451 | CD4A508F248776D8679ECEDB7BB1AF1752C23FDF66284522B4B36F242471B72C,0021B5B11CEB03402D618134800A36C54E1C4328AD389D50B40EACC1E881DCB5,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 452 | 1E75347868FC5FDDD501E1E2B56C7D511030513B0E9F45DC074DC562F11590E7,C9F9C03434997FBD0FBB698DAC556264EBE967F948A97978A0C32EF85F94B188,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 453 | BC5D2B2C7E7CB051D084484259095B2868CAEC001C09A6FD33302B0AA0DFA7E2,1BCF1611E0CC92C9D46D2A51C7ECF6EC63C562EF759324A1D9151D508A16B7B3,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 454 | DD32DCC6A6E054F4FB518B3F26EE9F41D338AB5EAFFF83F3682E34728EAAECEA,21258FA3877177AC480CB571134BEE7BA1531DDD1274217DFF71BCD618F6C3D5,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 455 | 7391D51035BE75620EE4F0F597DF65F54D3518A7CFB74276D7A778AAF7B39477,8810B37003E7CDDA026663968AA9E1B9CCCC96EED98528CF5A975BDE7B8084B7,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 456 | 66CC4EE53DAE4DD746AE6D8B58B858DDDF1634A498D5EF41F50264E6F948F526,C05B9250BDA8E86B6E5C6A8C584F0F61B4A3D243689965B5A955A2CB198D1E99,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 457 | 87150D354E809EE266FC005B1DECA64F70A72B9505AD79062D337EEF012CA896,DAF87006F2653909E39A52B7ECB234484E7AC84AC21EB59354C1BAFCDDF08D9C,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 458 | DEA5BD5268B76F56B4091A20C806124DE8054FB07A652CF0E883BBA9A0938DE0,7490AD46B3AEA32DD21C46A7A42FF4183FFAA7C486C75C6438ADF936E512B9A5,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 459 | 372968218A3CBA11D964EF1B1E8CFF3804EDF96481B96B929208D1B483ADB30C,D28AEC97E28A38D94BE65369E43D01F6266195D6113E7ED17A6930A309288800,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 460 | A7BF87F519397CA73C79AB94079E0E8218661C149713A8A286DBF1079E57B4BE,A5BCFC748DA415BD7F00B669E1237C9898A6D03517CC80B3626F0BE326046B28,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 461 | 07463549E9B992F78E7E64BD24BCA93754EF3674F5F5D76C4D44F462060DF0B9,86E9384C41F9339D9B0F80B48055D02BE5FF908860F2CEF63359E0D8B7937A27,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 462 | 331A6D1D07B7A19AB36312AB8303C9FA5B5D2628B6EF5C593846B6F4B824059F,DF6EC4F50BE2A4B7657F0397BED483BE143A18883615800A65A64B7E84D9B858,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 463 | 3142879893B677C1B25C92F9CF1DF3F90B209509992D52E9C64C3371296A9A08,4F93ED05AD7E20BDDE6241D24B196D6334C8C4010D92757E4868FF4BBD6A0F98,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 464 | 3A5B30A5017105C4CB30A0793FAE4600BF4A1A442D85C79E98405DC0083DEB8C,2A92103865FB60FC84D357180CC7DB45359B04AD419E8C4FAB74F7143FC0655A,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 465 | 9A7FA44AE658F9CDED2AA0CC440EAA8134FC1FAFED290ABBC8C45EC670884605,F4D7D6F0D820F749A442DAB0A34D53A71CE47DF51DE07E6723AB848108AD1945,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 466 | 46BA7E327D359A9B108CAFBBF2D7B6B32AA6767C2A3A472B4FFE2587FE376977,0B4908AD33CB2F7E87D3108B74364C5C42FA597807EEAC98DE5EC63F5896CE34,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 467 | 5E189C9D2633F0AC10ECB763A150568925884E29ED684050194D87B883B68B34,7803F12E7E1B7063502EB8E223A9013E2B61125A888B74D61465B51DE53276BA,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 468 | FC40897F668AA86E5279CA8FEB62873A06A569742967E0F243F51ED56BDB53CD,4380A43A7B0BE1ACE54A65B3E25ED35F340D6906365821AF139941D5D6E1EA1B,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 469 | AA4931B170DA278A4A954FEB76CBF7310B657AB9232D1C7A4B6EB628D8A98073,C999EB66393506C8149C35C8A8CE87671895D65167E4B0140B54DA72A92D7C88,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 470 | 94F92895ED36D4EA45B0942E755640420AF5CA3B8E3EA855FC6A39C9A3661666,AF3BBF0C275BDD5EBD8A87F00263847485572F8A983DEF0EAE9895CD93D7FFC3,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 471 | A97E2E39DA89F16E0AFB9CF3A213205ED00BF2200A573812B5C5F56FDB8B2402,5AAFC9F5F98DB75F8519D8652924932939760F00DF8827FA2A6E36DB265F21F8,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 472 | 4CADDFE7EB99A666652EBDA685A542612C851C732801AA5B15AB39E826D7C1D7,706B8A820652212D3A5F57303C9CB2B80B9E79DCF2621F29318AF2346419EDFA,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 473 | C2BC0ADF3826972A0F8EF7E63C008C52D68215CCAE493CCEF14C3D3F4F67BDD0,B632A6286C6FAA6643EC34311E0B9710A3508FC952E9A04263C33179E32814F8,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 474 | 494A55C84A5A244292DB7F678D4574C7CC6E58D522F0BE270D68B0F1A41E19D3,7AB5FF84B7B80A432366E3BBCC198ED382C9FD592CD5DD210138D2F9297CC1F6,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 475 | 5ED5BD6952F8E520D74AA3001BC587493AFB6D628C0A3BF80875676C63F07B75,6078C0FA37D9D35DADAC7AD90E90A3A95C44985A3D305BD22A5D838ED45491EE,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 476 | 5AA8E7418AE78250745BE3ACFC2B8D1FC1DD4D1DEFB54F19A508BD8247CC958F,AF93D5A2238F01D595A1BC2092F0AB29A550B2B96BDE7356EBF64D8F04234958,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 477 | 891C44B16ABB7063144BBEF23BC35609FD14BB3FCD8ADFD1E804526AF344EBD4,9F136F152A21885D574519554C7B64C15F014E413CDE6AD160F2091EBA9E6424,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 478 | 641A3F8E77A42F04B0F300399F0FE6545733DB7EE00FA402358723E84BC62741,91D56D765B020B99B7716582E3C380147FF0ACDDF63BB09ACDED0C0249E5CC8C,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 479 | 35F731A87345B78EAC85100D339ED77CE83B7DF6151B401B446A79D9FEBCD36D,DE7F766E4454DA118A6C42BEE476C4BB66F660BFDB88DB572C4621C43EC1836E,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 480 | E8E83E3E343C069277EC4C1E79C5C61D20917E0451B9A980346732EEB7B840C1,A109E71AE3A0376CA0059A421250508EDB2BB624B6517A291F51E249F16B5CE7,bootarm.efi ,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 481 | 574695D73FF3813C780728858B4A6D2CE6D24B41308B23281E438B66A60E4424,35C16AA2BB4DADF5028F4801185CD368B922C6CF7651CB7FEF30DFB95920FB99,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 482 | 0E0D94096278CEDCF333D4902F64ADE7815ED4000A1F6EA45EB93D2DBE18E496,22B5A88D79B8146598613B3701B0D2AD3E1D2BC215D3A613A30356953239485C,bootarm.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 483 | 997CCF341DBCE2EB9E119803723130DA90E8F1DD167A7B75400E73CBBADA54FD,06E3F646CEB102372E3E086D46234B06A9AF13EEF65AAD180EA2880BF8BC12A8,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8,23-May 484 | AC390194D59EC41A1A01BD96417CFE79E833CD6BBCA820B5FCB35CC3FE99653B,731A31CC36C5A7D7445F9644CE4E850E99CC7962EF6E2DE98721447A1438D805,bootarm.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 485 | 86E5B25AA8072895E72E3D5F4BEACCC1488A434FB10BABE17FB9010DA4ED93BC,07B6D3AA86D0A8D5F46BDD5886D8F20FA2DD9377898D1139BD74B41F5E7AE44B,bootmgfw.efi,32-bit ARM,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 486 | 2674036BC5EE2446739FBBBE21F8480DA23AD5E98A6768754B4C9B9FC37EF2E2,A1A59CC2784246AD693B1DF151454642324E89C898566A59906891F48089ECE9,bootaa64.efi,64-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 487 | 85C838E95601A4B1CFA64600FC4A16330CB50D575FB2E89ECAA08D6B12B50CDF,C0530BADC4D066D5C4B8B955023E9EFA7FB9337ECB7E1298E7CBA172D8680485,bootmgfw.efi,64-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 488 | A7CEA30E7B024C8710F9AE5C1302545CEEAF23B8DEBE362FB26562ACDD807325,D465D63B0384F16A1610B0A86C5D73B36A33709828DE8FE26DBAC6DC6EFA007D,bootaa64.efi,64-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 489 | C334B9CA48819E7E408A3A3418879978828AA302BAA3ED86DE64D8AE5ACA0EAB,AB311E737112E4D34ABF545836BC671637663E93738CEFA37405214CE8C92A58,bootmgfw.efi,64-bit ARM,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 490 | C990C8BF9D0C8E5A50CAF28C9FF6E8EA1949C5DD6AAAC5AB08B3A77CC0D5F011,1C19A5A240A361131DCC5EC25363DA6E79C7D55B3C79C0976C947F1D04A38AAA,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 491 | EA21E2A1F1779F77C35060CD8690D2E74116C4402DD10B6F8260DB2D00B4A9E5,941A51239ED416A788B5059DD647631B16E506C8F6AD87B1D5F3B8C97199A160,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 492 | AA38D5E097A9853A25A1DAA838ED83BC43569DB871FDF24888512A434024A866,FE0E58846C40717FEDE6A1E0D6A0546CBF8B8CF0B82258FC16D05BAB58107D34,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 493 | 1EADF7BF5FDE916884A4BEB82DD68BA50BE05413F00AAE8571190A2EAA462640,05729029EF940C5E6EE96B3B1253C08783C01329BCE2E9951BC22A09223FC15C,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 494 | D1AF02FCA7522C8D27E053544B3B653FF2DAFFCAE9C420E460235DACAB53F7CD,7FDDFE06C44DC4302DA54577353C18FDBE11B41CB3E6064EC1C116EE102FE080,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 495 | 642296E7342D651FE2FE547C1F08329777CCD44DC4F11C75FEC1F037A9B4B9B4,F02174BB75BC774DF2D7A63A0B0F7A040C9907399F97F642743DA97DF30104C7,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 496 | 73ED112C5EE295BA56BEA8679E062EE22A5E01B23438A7B8F459AF8F61A93BF4,FDBE6C45F2414421562D812EB67C5FA0CFD0D40AFE2CF0CDDC5E09054ACB4FE5,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 497 | DE1CB8E571EEF26A3C4BABCEC97BA41894AE9DE7528A35BFF5FDDFF5C025CEED,5348075329A1087EBB689FCFC775304B09C6786A523F83E7BB90E26DE0E61FF7,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 498 | 6A412612692B81C56395EDBC4E4CB189478D15BD7474A01829ECF867C71ED871 ,BF550C6F826C96461552E665F53A4F275A14838FD64CCF773D194B78CE33E907,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 499 | A09DBE91C9743163A3DC26BB7E51398C751DF7140D5DA4DD6D43B1915FA906EC ,324CBE75EF34E09A98C71B186F535F9091A1FF257BEA93DFEAF199EB352CA0F6,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 500 | 55A5BB13E3A985E0AB011E69B41704319DE0843F9254CF91ED2964C13AF345FE ,A6F13F3BB8132D248591F6762CED6D3A55EFD8812DB9730449E267CB6447145B,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 501 | 4BB0A426CA2A23E05B62A3008009AAD7F184F3D24DBD65E9AA81DE341BC5326F ,C21614E207B1991D3D6DF842009718652D241A8D926E221B85D069F1615E27A2,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 502 | B510C9A79CB6CE1BC37912839AF57B453CC4A77C3D5DCC9935F8CCFF7C81F9FE ,D79651AA3A0491D33B7979F5B41936F8ACEFBA99BBA10E05FD6F54E2859CC589,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 503 | 3E5206C60B696D3B81696DF457D74881F0188ADFD75404A4C0AA627688975671 ,3E1A6021B3C6066E94F7F06AD7B29E35B1BD9EE496827A290EFB9BE7A27C5D63,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 504 | C443B4E3083BDBF2296A5E0986022520535C01ECC6CA3E0F0F83F3B683672368 ,50F93402B66127D87B947067E9689DF5B2B36B253833FFE1E6CECA685FAE2D85,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 505 | DB67C1601CC3B3313B9F6E8F12E76627E7BC6F3936BD8147FCAFAF5FB6556966 ,A5E476C4BA2ED8EF8C30F247F3E13AFA5C7E3A5A952E4B8325C22F33F7F23621,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 506 | 4B6C8947CAA89BE6077E2964C4F97425C663AEFEBCDFC373CAFD982367FB5CFF ,73BAEB8EB0B64056A7BC309642FDC589BF219928A906666D107E65E8B0DBF496,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 507 | E9F55F39797D7ADAA99F2FE4138D413A10539C9663976B055A705A76C6A916D4 ,D455A3C084DF64CF66DC1D2BAB352C74AAF66035058DF1143EFBDD4298AA4527,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 508 | 132D59D83C29BE7351D35C44B846DFC3F37B3C62BC40EAC6AEC3FD68E7CFCFDE ,4F94F40C6B4BAC7BF219C73DAFD0870879F1DB10DE6C8620F6F1333D7AA5455A,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 509 | 2B334E6B147104306DD91F77E900C07383C0DDFF77C2979EC79EA5D92944C13D ,71A5716DECF09FE8BCBCC73225FE1E7012076CEA39B49E9E72AFA291B1FB717F,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 510 | CF960A60921EF186A0A511BECC06B264407111D2AE6875C93496121887318EDE ,32D4BA3A03D1F2B6BC80D011C0FA107747B7B573FE96AAFFF21735ECF562D337,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 511 | 79193EAE46F687D00B90B3EBA361B35802BD42E2891A8A8C286B4C00119F9F94 ,F33727B54A9908CEC7ED8DB582A1482420FA257B61B559C47343110872ADF7D8,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 512 | 84897E4405319DAB2822D63147F3DA90AC2A436A7D24EC5DD91B277AB6528FAB ,6A16ADA3FE0C5468F0A43FB2F597A42F3DA3218C88EE819BF799110CF7A79B6C,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 513 | 9C4A74D11888FA41A0341EE6F0B75DB69C34827851755F46506A6C0ED96CEC8D ,23A0F1DE04EF678E621A449040CF519DDC3679FE54C9E2E0897DFE2C80D3DC26,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 514 | 4E00B1C1CC2BFCB1FF2FDB4184D13CEA5A2617BACC3623C3DF52C50158065E73 ,49465D4AD701642C7BCB5EF30A0807A3CD438AB42BF8D62D68038C3FCBBE8605,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 515 | A8FAD7CD0CC1DC152AE0880C21D91F6270FDB410D60E1129963AFCD3DF5841F1 ,839894ED391B7C88E995F845CA152F65BF881850D768E3EF3880838B52846A74,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 516 | 6FDB5AB3815A499948DF5ED732EE275FA44CE8313287A33B2875B2A2B1D60021 ,B7EA2FBD3FEEDA309912B2767BA80DD037813E80FED17CDA79EF7F62B6D1953B,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 517 | 944E6F803D3E1B0C1AA767B14B0F4D960A45F80F0A0A459253CA65147E947F72 ,99B2BD1FCF17B52C64E8506B97FA10CF8B6397C9D05D8D543F86893B210DBA62,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 10 version 1507,23-May 518 | 3E964DC8AAE03D464F3DEB556C4927075AA9F3A1998C66D65EFDE178F465D7B3,57AEAB53DB02CCD1E307AD3BE524EB507D0339BB2AAB3BC9B653088B7E790FCC,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 519 | DB9643F6D78C6C5BDC29B041660174324639BE8B3BC6E247C8C2026E68C4E618,310949B7FD26AF0E2E29E1C902AC198574F096D15836376C8B3EF2DD1FB5F1C5,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8,23-May 520 | F2F2F729FC1B94C3B3AD210E0664FAE3351D0D7541581FE2C6DC7B087BE2B16C,C2CC91555617171A7D8AF57DEE529B443A41A1FAD3D4032DBDB814DAD6C2688E,bootia32.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 521 | 88582F3CAE30AFD77990944709AC4E272D68CDC009D9C3FF6F7C2E19E74F5975,490C927242CC6227CA439A7E9AA9D771AD4D1686EEDE1F331CBB6C69E9BE746E,bootmgfw.efi,32-bit,Microsoft,Black Lotus Microsoft Windows 8.1,23-May 522 | AE9B42C6B180409F91B7C9E6EA4CECDA1E7DCFFF0FF9B228564726277BBE3929,15DD2FF6416858790A5241C335F675540750F611110A5D2D67B4517D08260AF9,BootAuth (2).efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 523 | C60C257A67130646E59BACDA7AD0AF7A8CBE6CB91C58EFD1B860DB4D985D54B2,B1BC5EF4F5C7E8F683601217650F42E7D69EFC0098C22A4989C7990B7771C277,Bootauth.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 524 | D3D8A7AE1BFC17D2F0D985F34E7D8DB681E20FAEDE05F88A102814B21DB12B2E,39E7DA89CA9899B8CA2CB826D7FD910E525AC9E6784D54D8316E00650156A341,BootAuth_1 (2).efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 525 | 321F751680C6B7FED4730569D3E956A8165F0E05995B85D8C84318FB1B4281EB,20082B6101F8D7DADE206F4FDEB367622C11F809C4CF2D215D834460179EF2DD,Bootauth_1.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 526 | 9E7CA835C5001D263927F03B9A198503F98ACC15F586D3B9BF94C3A2F2BA36A4,1E73F9DCF231163C9B99C9632B0C379B94209B068EDA8945951F125EDD6ACC9F,BootAuth_10.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 527 | DDB8D197BF015836EE60539F538F77BD26160C259354E7442FBB754E93273138,08D13A5AB1795D47A3830FB3E34437882514E0FFC9BCEE122227C354D29FFD1D,BootAuth_11.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 528 | 19A66AD7D8CB0D105C998F0D68E1A38B2619D32245F4F225FB6F57B89ED7D946,9E531D100AC08C28833FAD3CA5D3B863BD1323D2F118F83D9DB2B21407CA9E64,BootAuth_12.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 529 | 532450B2495B4495D96D305323BA8FEE365182A7D3F2DA390D88A794BF9FD50A,73782E2981C4EED10CA0170DD06B2ADF54B1B6E95112FC60DB610C1039E3931A,BootAuth_13.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 530 | FCBC7271FA790DE17D32CC138AC63A1E52BB63161ACB7AF690F9516E3568B9A5,4561A888723EF5D879B44B02144125C9566D4FC7C674EE5A6E3246E6457F3DF9,BootAuth_14.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 531 | 276D92E6F39D3AF0560E1EC649597D17656B305405A4016B1933253365140023,DB34CFA2F5239656EFEB51537A7EACB98AEC10ED2B40209C0F50DCD3DF6B50CD,BootAuth_15.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 532 | F9C44AB5083ADBB7F3CF922CDCE4694CC6485E6CCE47802819F732D3A1547E3E,0690EADBD2302957BF7912C2851C33463C855C10AD226A11BBFDC8D69D8A14B3,BootAuth_16.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 533 | 1A7447F1DD22F287CD82949197B3A95266F8C55C0A440728954CE19610956BAE,FA0D9315715290276F4558DAC2368BD828789F42214F5707A932E5C518E59F80,BootAuth_17.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 534 | 5E10D6A1925473948CDD49F4C25468E5A0A7964B362AB31EE05658E320738F90,9B4BF870DCB0610A34E441D32669DCCE2ABE5E697C67B7C4328A891397F4DB0C,BootAuth_18.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 535 | 41309068910FD38BC2F357A7D4C4DF7FF0B27A511B671258650BF9D95FF814D7,F41DA7DEB9A214E653F738BBF4DC9168C606E71E8095E7D50215B0DCC2CF71A3,BootAuth_19.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 536 | 7C514FBCC9E4253062423349FD2F72C376C763AC5DCDE0D6A69112507C17724C,48BEFA8CAB6DBE7493EDE483396BB41BA9D46594606174B7FBCA3C0D17E2B6AA,BootAuth_2 (2).efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 537 | 4C9403C165B012CD2D95A7B6F43325751E868D0138C27C4FB56EACF9D74207A4,6CCA75EA065B35B9AAC96999DC3A4254CDE518139169C4BD160797F8E63E29ED,Bootauth_2.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 538 | ED700CBAFB2C1BD3EDF347854AEA3A20B1D5ABF6CF05185400568E416DCA79C9,109C91802D4EECA88BF607CBFA6A67449CC63F6E6E9BD0BE6B20EED263420C04,BootAuth_20.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 539 | DEB40AE3D1F23C9A88E33BCD7D7F7719AF428E30965B1D0DD4B2F5BC870F51DF,E261C78511A77E74801F273919B0852BF44A31BC0600D188C535D88BE7ABA052,BootAuth_21.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 540 | B9C60B112108BAB1246B76E6525C08D49562C13034B944B71EC34556F940CDAD,D12924557C7E2714A9C77F64D6CD391FDD6509FC138CCDE16512EF226D15FA7F,BootAuth_22.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 541 | 206A94D9CA1F319FF3537B1838D4AD9BDC1C7E2026F4CBDF74471E540C0B6DA8,6C611BD22926D8778F0A6B0A095A839D6BBC40D5AD23F55B9F8560647361FFC7,BootAuth_23.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 542 | EC2106DF4DA9DCCBDCAAD1C93D27469F45BAA8A16DD60706A50D4328F0796215,080A627E31BDC90041AD30B5604DE9EAE8C85ABDB621B5B55D25CD13ED182D06,BootAuth_24.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 543 | 99B3D1E0B1E7895EB811AAC3B4B5A3C581921EBB33FF9CFCC8755F4532E3F190,8A6E68D85AB00FD79783BFB955CF989BD1938F02DC57E371FB07EB1FAAF55901,BootAuth_25.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 544 | 1327FE12A05D65C7A963EC7CB2B0158CB5886FF0807E07C47B8968C6A3C753AB,28412FA02802A3939A709F518798404582FF601E67EA9C542C78963F2EAE18FF,BootAuth_26.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 545 | 42A585C0837A36DDF5994C14E5EB1774E9605762D6D953463EB8B2E16F164853,EE606FA2CD686DB7554C99C4BB37D87E64F89153EF26B4CFF41834DA74EB4C1C,BootAuth_27.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 546 | B681567A7C110B86D7A609B5317F45FB43D994D6593FCD3AE328F28051B6CADA,136089AB3A7DC68C19F139558F0644DC57D32E9CEB79D6E54D9D6492AD2DE614,BootAuth_28.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 547 | 731091BC0160DBAE460165C83C9229A7161F83C3A0ADCBDF2FF5EF9693110B09,F5A5415ACA106C63AA6595D58861F8D7E87143BA9C742E2E2819E3411D685496,Bootauth_29.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 548 | E3079F0B472010065D725BA9CEBD6FF42EFDE32A0D26D30028B2965E1A67C7D8,DECF57D609F02AB417FE4DA0D96EE4388181A3C6593083AE57C5DF05F5F918F3,BootAuth_3 (2).efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 549 | 0103FB55FBC13461AC52A6F2D3B64AE0360A5A4050FB98A0FD91D651DA084BD4,1E91FC3FEE40BB2B6077F7E9A31F26C2E887CE91B41E5268EE795BE53F11329B,BootAuth_3.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 550 | 093430DAF376D83CFB1ABA0533A74838F43233487AF08726C403A53669AF91A0,FF6ACFBD5962499FB8846DAF87B88320C115D7711EA645BA6742E8598E884BD8,Bootauth_30.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 551 | E921AEEA0C90DA667257B4219FBCDE46B5B43224F4E373009EC7DC9EFB416104,8C1EDB6A3F46D13CC6E58F6D2C7EFD958EC079AA029478BABA9AA9F53DB9F0E3,Bootauth_31.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 552 | F567652372B16D488E45F508ED774D026DD3352710DA0C8B99603E40CA5F3B86,5E41B89F7F471806E1917EFDD040953CC22F3F362E7B71423FF70E55B98ADB13,Bootauth_32.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 553 | 0772A445BCE6BE65B5898B8B165E4A88FE3560922C89E0727298BD7C8D26D1F2,8CE986614E7037218A61DB51B876341898817741ADE85156CF54BD1CD17999A6,Bootauth_33.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 554 | 05791CFDBCED17192B5D43FC3BB61BACA78830AC83A82BA44B830FE1E618F615,D9247336AC0D12CABF04DFD88227D1E640C0DC59739BD5B3CA17DF90B3331C3B,Bootauth_34.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 555 | CBA1AA4E4BE5226C5A836C46BDB5007AFCDF4005EE82E8DDD5ACAB603D0CBF34,ECB789C173E1FA4E604FF45A57A45B2868D8ACB1CE616D8AEEF08D5E252CCD6F,BootAuth_4.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 556 | 24AD49E006879FC1C821C92EB59429C166B8359F109A20C6D6DB4EC0F3FDDABE,4AA5F09F5022EEFBEE350D0DED72654D21A9E77DEEC49FEFB45994708BE11703,BootAuth_5.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 557 | E6DFB55C0A89C631F903DE7AA3CC4B34673F29FD7A91B47954BA8991E2D7E066,ACD9B08302C0FA9C87D14920BEEE724B92144774DC095A22EE5D8F023E80D677,BootAuth_6.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 558 | 99FC88E5A8B7E320A5564FDAEC22EAC3819D24AAB6E789371B7BA90A83FE7686,7AC0BD56947B20B82303E2F47D4876540989872EC39D08DAF5635240B5EE7E9F,BootAuth_7.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 559 | F4CBAA105528D7C63028202B36FACFB4855C70A111BB6EF46630BC2F9D1C756F,2D59C29B059FE54A4F218BE5B1F37723BE29BA47CCDDF07FDEE604ECC57B3F62,BootAuth_8.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 560 | 95FABF69D97B175056FDF655136AC1F56F464B5411F93FBCC1DACEEEEABBC4E1,E427068FBA7A44C96515C47E9871798284A06397D4C8687DFDAFD0738026DDBB,BootAuth_9.efi,64-bit,SecurStar,CVE-2024-28924,9-Apr 561 | DDD3B34A10AE5EC28C0B8436A9D20840B9F031BBA13DC995C272261C092EBBB8,6B9E4804BF89363E2D28026A9C3D8E4B76DF97AC0F5C6E009E8C0979302AEB94,Bootauth32.efi,32-bit,SecurStar,CVE-2024-28924,9-Apr 562 | FD5F7516679C1E93B4DD43970531EC7A6AF0AB3C7BE78F50A56510826A23BF66,C631FAE3E49C8EE83C0AF1AE9E6F116A382E71A88D05618DCF49433E030F4476,LenovoBT.EFI,32-bit,Lenovo,CVE-2024-23594,9-Apr 563 | B54463CA19FA2088D26D1B335C98E9B1458F4F4BA301357CE3BCC94987CE6F0E,BB4919D8F38DBA90154F963C47BE83B665076C6EB4B230B3CEE91E4B7706CC12,LenovoBT_1.EFI,64-bit,Lenovo,CVE-2024-23593,9-Apr 564 | 1F6A78DFE77181CC3771E928A158856554DE405614E8856BAC103772501601C7,E9E4B5A51F6A5575B9F5BFAB1852B0CB2795C66FF4B28135097CBA671A5491B9,ReLoader32_.efi,32-bit,Howyar Technologies,CVE-2024-7344,14-Jan 565 | 20FBF95C129365C6EC6C0BF20C8FD6A294BD8321F19DDAAB96D522BF7AC333E9,CDB7C90D3AB8833D5324F5D8516D41FA990B9CA721FE643FFFAEF9057D9F9E48,ReLoader64_.efi,64-bit,Howyar Technologies,CVE-2024-7344,14-Jan 566 | --------------------------------------------------------------------------------