Code:
Operation : Remove Viruses [SmartAV] [ v1.50 ] SmartAV Conf : 100/80/2000 1. Power Off Phone , Remove battery , Insert back 2. Insert USB cable. In some cases require hold BootKey Wait for phone... Phone found! [ 39 ] Sync... Inital Boot Ok! BB_CPU_PID : 6582 BB_CPU_NME : [MediaTek] MT6582_S00 BB_CPU_EXT : 0xCA01 , 0x8A00 , 0x0000 Processing BROM stage Settings for BROM configured! SecCfgVal : 0x00000000 BromVer : 0x00FF BLVersion : 0x0001 PreLoader : Active [ Boot with PL ] BootLdrSS : NORMAL with SPRELOADER Processing DA stage DA Select done, will use MTK_AllInOne_DA_v5.1620.10.01 Sending and initialize DA ... Running DA ver.4.2 on BBID : 0x87 NAND Flash : NOT INSTALLED eMMC Flash : 1501004B3858564D42013B18C44E71E9 Initialize Memory ... DRAM already initialized by Preloader DAgent sent , init HW now eMMC FlashIC initialized [eMMC] : FLASH_VEN : 0x15 , OEM : 0100 [eMMC] : FLASH_INF : [SAMSUNG] , BMVX8 [eMMC] : FLASH_CID : 1501004B3858564D42013B18C44E71E9 [eMMC] : FLASH_BRT : 0x00400000 , 0x00400000 , 0x00400000 [eMMC] : FLASH_LEN : 0x00000003A3E00000 [eMMC] : FLASH_UCP : 14910 MiB [eMMC 16 GiB] DEV RID : 0x4633F1E2D1EAD3D814D7F45E60F26F09 INT RAM : 0x00020000 EXT RAM : 0x40000000 [1 GiB] BOOT TYPE : EMMC_FLASH_BOOT SOC VERIFY : C1 Boot Ok! SmartAV Init Ok! Scanning FileSystem now , please wait Scan Done, infected files found : 32 Removing infected files and scripts ... SmartAV Report : Removed 32 infected files! Making additional operations ... Special Op #1 : Clear Recovery Data Ok! Special Op #2 : Clear UserData Ok! Special Op #3 : PostFix Ok! Done! Done! Elapsed: 00:01:37 Reconnect Power/Cable!
Code:
Operation : Read Flash [ v1.50 ] 1. Power Off Phone , Remove battery , Insert back 2. Insert USB cable. In some cases require hold BootKey Wait for phone... Phone found! [ 39 ] Sync... Inital Boot Ok! BB_CPU_PID : 6582 BB_CPU_NME : [MediaTek] MT6582_S00 BB_CPU_EXT : 0xCA01 , 0x8A00 , 0x0000 Processing BROM stage Settings for BROM configured! SecCfgVal : 0x00000000 BromVer : 0x00FF BLVersion : 0x0001 PreLoader : Active [ Boot with PL ] BootLdrSS : NORMAL with SPRELOADER Processing DA stage DA Select done, will use MTK_AllInOne_DA_v5.1620.10.01 Sending and initialize DA ... Running DA ver.4.2 on BBID : 0x87 NAND Flash : NOT INSTALLED eMMC Flash : 1501004B3858564D42013B18C44E71E9 Initialize Memory ... DRAM already initialized by Preloader DAgent sent , init HW now eMMC FlashIC initialized [eMMC] : FLASH_VEN : 0x15 , OEM : 0100 [eMMC] : FLASH_INF : [SAMSUNG] , BMVX8 [eMMC] : FLASH_CID : 1501004B3858564D42013B18C44E71E9 [eMMC] : FLASH_BRT : 0x00400000 , 0x00400000 , 0x00400000 [eMMC] : FLASH_LEN : 0x00000003A3E00000 [eMMC] : FLASH_UCP : 14910 MiB [eMMC 16 GiB] DEV RID : 0x4633F1E2D1EAD3D814D7F45E60F26F09 INT RAM : 0x00020000 EXT RAM : 0x40000000 [1 GiB] BOOT TYPE : EMMC_FLASH_BOOT SOC VERIFY : C1 Boot Ok! Reading Flash Content now ... Brand : Lenovo ProdName : A3500-HV ProdModel : Lenovo A3500-HV Device : A3500HV AndroidVer: 4.4.2 MTKxCPU : MT6582 MTKxPRJ : ALPS.KK1.MP1.V2.10 [Read Ok] : preloader_lcsh82_tb_3gfull_kk.bin [Read Ok] : MBR [Read Ok] : EBR1 [Read Ok] : lk.bin [Read Ok] : boot.img [Read Ok] : recovery.img [Read Ok] : secro.img [Read Ok] : logo.bin [Read Ok] : system.img [Read Ok] : cache.img [Read Ok] : userdata.img [ScatCFG] : MT6582 / V1.1.1 / lcsh82_tb_3gfull_kk / EMMC Android Info saved MAUI Meta DB saved HWConfig Info saved FW Size : 1249 MiB Scatter saved to : F:\MT6582__Lenovo__Lenovo_A3500-HV__A3500HV__4.4.2__ALPS.KK1.MP1.V2.10\ All done! Done! Elapsed: 00:05:24 Reconnect Power/Cable!
0 Response to "Lenovo_A3500 Virus Removed Red Factory File Done"
Posting Komentar