1
RogueKiller / I can't install any Antivirus - windows 10
« on: April 15, 2018, 10:19:01 PM »
Hi everyone,
I have a problem, I can't install any Antivirus and my hard disk is increasingly filled, it's a virus of course.
Can you help me?
This is the logfile:
RogueKiller V12.12.12.0 (x64) [Apr 9 2018] (Gratuito) di Adlice Software
posta : http://www.adlice.com/contact/
Commenti : https://forum.adlice.com
Sito Web : http://www.adlice.com/download/roguekiller/
Discussione : http://www.adlice.com
Sistema Operativo : Windows 10 (10.0.15063) 64 bits version
Iniziato in : Modalità Normale
Utente : Valeria [Amministratore]
Iniziato da : C:\Program Files\RogueKiller\RogueKiller64.exe
Modalità : Scansione -- Data : 04/15/2018 15:13:49 (Durata : 00:55:04)
¤¤¤ Processi : 0 ¤¤¤
¤¤¤ Registro : 18 ¤¤¤
[PUP.Cacaoweb|PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\cacaoweb -> Trovato
[PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\OB -> Trovato
[PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Squeaky -> Trovato
[PUP.Cacaoweb|PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\cacaoweb -> Trovato
[PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\OB -> Trovato
[PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Squeaky -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Service KMSELDI (C:\Program Files\KMSpico\Service_KMS.exe) -> Trovato
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://samsung13.msn.com -> Trovato
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://samsung13.msn.com -> Trovato
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{dd58c9b4-11b6-46a2-b03d-d1734bac26b8} | NameServer : 10.133.15.210 83.224.65.106 ([][-]) -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {83B147E1-156B-4807-BCB0-45B0128B55D4} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [-] -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {5B36733C-0AA6-46BD-A545-F2FF10E1CFC4} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [-] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | UDP Query User{1B27F1F2-A461-40B5-AD61-0D59A4D3C488}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | TCP Query User{9A70DC4C-D359-431D-B5B4-237DC7D772AD}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | UDP Query User{E2541548-130D-4ED2-9499-5F02E8AFFA21}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | TCP Query User{78AB7065-4547-46F9-8006-C77A77C4B414}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {827A46EA-AC69-49FE-8FC9-4494160372AC} : v2.27|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [-] -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {AB32A904-BF22-4E56-8EBF-30A527F2992E} : v2.27|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [-] -> Trovato
¤¤¤ Attività : 1 ¤¤¤
[PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Trovato
¤¤¤ Archivi : 20 ¤¤¤
[PUP.Gen1][Cartella] C:\ProgramData\APN -> Trovato
[PUP.Gen1][Archivio] C:\Users\Valeria\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Popcorn Time.lnk [LNK@] C:\PROGRA~2\POPCOR~1\POPCOR~1.EXE -> Trovato
[PUP.Gen0][Archivio] C:\Windows\SECOH-QAD.exe -> Trovato
[PUP.Cacaoweb|PUP.Gen1][Cartella] C:\Users\Valeria\AppData\Roaming\cacaoweb -> Trovato
[PUP.Gen0|PUP.Gen1][Cartella] C:\Users\Valeria\AppData\Roaming\OpenCandy -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.5_41162\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.5_41202\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.5_41865\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.6_42094\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.7_42330\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.8_42576\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.9_42923\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.9_43085\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.5.0_43580\utorrentie.exe -> Trovato
[PUP.Mobogenie|PUP.Gen1][Cartella] C:\Users\Valeria\AppData\Local\Mobogenie -> Trovato
[PUP.Gen1][Cartella] C:\ProgramData\APN -> Trovato
[PUP.HackTool][Cartella] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico -> Trovato
[PUP.Gen1][Cartella] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Popcorn Time -> Trovato
[PUP.HackTool][Cartella] C:\Program Files\KMSpico -> Trovato
[PUP.Gen1][Cartella] C:\Program Files (x86)\Popcorn Time -> Trovato
¤¤¤ WMI : 0 ¤¤¤
¤¤¤ Archivio Hosts : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Caricato) ¤¤¤
¤¤¤ Web Browser : 2 ¤¤¤
[PUP.Gen0][Chrome:Addon] Default : cacaoweb [gebbadcnkcgcfgpbmcdleckpejgopimf] -> Trovato
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : session.startup_urls [https://www.google.it/|https://mail.google.com/mail/u/0/?shva=1#inbox] -> Trovato
¤¤¤ Controllo MBR : ¤¤¤
+++++ PhysicalDrive0: SAMSUNG MZMPC128HBFU-000 +++++
--- User ---
[MBR] 1af09bc80530982c7430c07e53b4b379
[BSP] f350ca515cd2a68c0dad83937cdaf330 : Unknown MBR Code
Partition table:
0 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 2048 | Size: 500 MB
1 - [MAN-MOUNT] EFI system partition | Offset (sectors): 1026048 | Size: 300 MB
2 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 1640448 | Size: 128 MB
3 - Basic data partition | Offset (sectors): 1902592 | Size: 95317 MB
4 - [SYSTEM][MAN-MOUNT] | Offset (sectors): 197113856 | Size: 882 MB
5 - [SYSTEM][MAN-MOUNT] | Offset (sectors): 198920192 | Size: 350 MB
6 - [SYSTEM] Basic data partition | Offset (sectors): 199636992 | Size: 23601 MB
7 - [SYSTEM] Basic data partition | Offset (sectors): 247971840 | Size: 1024 MB
User = LL1 ... OK
User = LL2 ... OK
Thanks!
I have a problem, I can't install any Antivirus and my hard disk is increasingly filled, it's a virus of course.
Can you help me?
This is the logfile:
RogueKiller V12.12.12.0 (x64) [Apr 9 2018] (Gratuito) di Adlice Software
posta : http://www.adlice.com/contact/
Commenti : https://forum.adlice.com
Sito Web : http://www.adlice.com/download/roguekiller/
Discussione : http://www.adlice.com
Sistema Operativo : Windows 10 (10.0.15063) 64 bits version
Iniziato in : Modalità Normale
Utente : Valeria [Amministratore]
Iniziato da : C:\Program Files\RogueKiller\RogueKiller64.exe
Modalità : Scansione -- Data : 04/15/2018 15:13:49 (Durata : 00:55:04)
¤¤¤ Processi : 0 ¤¤¤
¤¤¤ Registro : 18 ¤¤¤
[PUP.Cacaoweb|PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\cacaoweb -> Trovato
[PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\OB -> Trovato
[PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Squeaky -> Trovato
[PUP.Cacaoweb|PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\cacaoweb -> Trovato
[PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\OB -> Trovato
[PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Squeaky -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Service KMSELDI (C:\Program Files\KMSpico\Service_KMS.exe) -> Trovato
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://samsung13.msn.com -> Trovato
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-3443065672-3322393362-3246383635-1002\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://samsung13.msn.com -> Trovato
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{dd58c9b4-11b6-46a2-b03d-d1734bac26b8} | NameServer : 10.133.15.210 83.224.65.106 ([][-]) -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {83B147E1-156B-4807-BCB0-45B0128B55D4} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [-] -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {5B36733C-0AA6-46BD-A545-F2FF10E1CFC4} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [-] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | UDP Query User{1B27F1F2-A461-40B5-AD61-0D59A4D3C488}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | TCP Query User{9A70DC4C-D359-431D-B5B4-237DC7D772AD}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | UDP Query User{E2541548-130D-4ED2-9499-5F02E8AFFA21}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.Cacaoweb|PUP.Gen0|PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | TCP Query User{78AB7065-4547-46F9-8006-C77A77C4B414}C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\users\valeria\appdata\roaming\cacaoweb\cacaoweb.exe|Name=cacaoweb.exe|Desc=cacaoweb.exe|Defer=User| [7] -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {827A46EA-AC69-49FE-8FC9-4494160372AC} : v2.27|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [-] -> Trovato
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {AB32A904-BF22-4E56-8EBF-30A527F2992E} : v2.27|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [-] -> Trovato
¤¤¤ Attività : 1 ¤¤¤
[PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Trovato
¤¤¤ Archivi : 20 ¤¤¤
[PUP.Gen1][Cartella] C:\ProgramData\APN -> Trovato
[PUP.Gen1][Archivio] C:\Users\Valeria\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Popcorn Time.lnk [LNK@] C:\PROGRA~2\POPCOR~1\POPCOR~1.EXE -> Trovato
[PUP.Gen0][Archivio] C:\Windows\SECOH-QAD.exe -> Trovato
[PUP.Cacaoweb|PUP.Gen1][Cartella] C:\Users\Valeria\AppData\Roaming\cacaoweb -> Trovato
[PUP.Gen0|PUP.Gen1][Cartella] C:\Users\Valeria\AppData\Roaming\OpenCandy -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.5_41162\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.5_41202\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.5_41865\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.6_42094\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.7_42330\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.8_42576\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.9_42923\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.4.9_43085\utorrentie.exe -> Trovato
[PUP.uTorrentAds][Archivio] C:\Users\Valeria\AppData\Roaming\uTorrent\updates\3.5.0_43580\utorrentie.exe -> Trovato
[PUP.Mobogenie|PUP.Gen1][Cartella] C:\Users\Valeria\AppData\Local\Mobogenie -> Trovato
[PUP.Gen1][Cartella] C:\ProgramData\APN -> Trovato
[PUP.HackTool][Cartella] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico -> Trovato
[PUP.Gen1][Cartella] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Popcorn Time -> Trovato
[PUP.HackTool][Cartella] C:\Program Files\KMSpico -> Trovato
[PUP.Gen1][Cartella] C:\Program Files (x86)\Popcorn Time -> Trovato
¤¤¤ WMI : 0 ¤¤¤
¤¤¤ Archivio Hosts : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Caricato) ¤¤¤
¤¤¤ Web Browser : 2 ¤¤¤
[PUP.Gen0][Chrome:Addon] Default : cacaoweb [gebbadcnkcgcfgpbmcdleckpejgopimf] -> Trovato
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : session.startup_urls [https://www.google.it/|https://mail.google.com/mail/u/0/?shva=1#inbox] -> Trovato
¤¤¤ Controllo MBR : ¤¤¤
+++++ PhysicalDrive0: SAMSUNG MZMPC128HBFU-000 +++++
--- User ---
[MBR] 1af09bc80530982c7430c07e53b4b379
[BSP] f350ca515cd2a68c0dad83937cdaf330 : Unknown MBR Code
Partition table:
0 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 2048 | Size: 500 MB
1 - [MAN-MOUNT] EFI system partition | Offset (sectors): 1026048 | Size: 300 MB
2 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 1640448 | Size: 128 MB
3 - Basic data partition | Offset (sectors): 1902592 | Size: 95317 MB
4 - [SYSTEM][MAN-MOUNT] | Offset (sectors): 197113856 | Size: 882 MB
5 - [SYSTEM][MAN-MOUNT] | Offset (sectors): 198920192 | Size: 350 MB
6 - [SYSTEM] Basic data partition | Offset (sectors): 199636992 | Size: 23601 MB
7 - [SYSTEM] Basic data partition | Offset (sectors): 247971840 | Size: 1024 MB
User = LL1 ... OK
User = LL2 ... OK
Thanks!