Monday, 15 February 2016

How to Virus remove not success MTK tab 100% Done

Virus remove not success.... MTK tab


What I do? Is there any solution with CM2?

Quote:

I done it. I mean I ran that option. But still same and I can see all virus.... Whatever Its a amazing feature. I like it... I think I can remove these with that...

Just ran with dictionary support and log here...

Quote:

Operation : Scan APPs [DDirect] [ v1.40 ]

1. Power Off Phone , Remove battery , Insert back

2. Insert USB cable. In some cases require hold BootKey

Wait for phone...

Phone found! [ 21 ]

Sync...

Inital regs read done

Boot Info :

BB_CPU_ID : 6582

BB_CPU_HW : CA01

BB_CPU_SW : 8A00

BB_CPU_SB : 0001

BB_CPU_NM : [MediaTek] MT6582_S00

Processing BROM stage

SecCfgVal : 0x00000000

BromVersion : 0xFF

BLVersion : 0x01

Preloader Status : Alive

Processing DA stage

DA Select done , sending

DA Ver : MTK_AllInOne_DA_v5.1540.01.01

NAND_ID : 00000000000000000000000000000000

eMMC_ID : 8801034E436172642020FDA43660919F

DA Stat : v4.2 on BBID : 0x87

DA Sent. Configure setting now ...

DA started successuflly

eMMC FlashIC initialized

[eMMC] : FLASH_VEN : 0088 , OEM : 0103

[eMMC] : FLASH_INF : [FORESEE] , draC

[eMMC] : FLASH_CID : 8801034E436172642020FDA43660919F

[eMMC] : FLASH_EXT : 0x00200000 , 0x00200000 , 0x00020000

[eMMC] : FLASH_LEN : 0x00000001CE100000

[eMMC] : FLASH_UCP : 7393 MiB

INT RAM : 0x00020000

EXT RAM : 0x20000000

BOOT TYPE : EMMC_FLASH_BOOT

SOC VERIFY : C1

Boot Ok!

DDirect : Init Ok!

Scanning FileSystem now , please wait

Collect and verify data according Dictionary

Collect done : 0x000B

[DDCleaner Info] : Files to remove : 17

[DDCleaner Info] : Additional garbage detected : 6

Removing files ...

[DDCleaner] : Removed 17

Special Op #1 : Clear Recovery Data Ok!

Special Op #2 : Clear UserData Ok!

Special Op #3 : PostFix Ok!

All Done!

Done!

Elapsed: 00:01:01

Reconnect Power/Cable!  

There is can be found DB for 1000+ virus

Also in manual explained how do that manually.  


Card found : S/N : 9619A483 , v0129

Chinese Miracle II [MTK module] v 1.40

Operation : Check / Read Info [ v1.40 ]

1. Power Off Phone , Remove battery , Insert back

2. Insert USB cable. In some cases require hold BootKey

Wait for phone...

Phone found! [ 21 ]

Sync...

Inital regs read done

Boot Info :

BB_CPU_ID : 6582

BB_CPU_HW : CA01

BB_CPU_SW : 8A00

BB_CPU_SB : 0001

BB_CPU_NM : [MediaTek] MT6582_S00

Processing BROM stage

SecCfgVal : 0x00000000

BromVersion : 0xFF

BLVersion : 0x01

Preloader Status : Alive

Processing DA stage

DA Select done , sending

DA Ver : MTK_AllInOne_DA_v5.1540.01.01

NAND_ID : 00000000000000000000000000000000

eMMC_ID : 8801034E436172642020FDA43660919F

DA Stat : v4.2 on BBID : 0x87

DA Sent. Configure setting now ...

DA started successuflly

eMMC FlashIC initialized

[eMMC] : FLASH_VEN : 0088 , OEM : 0103

[eMMC] : FLASH_INF : [FORESEE] , draC

[eMMC] : FLASH_CID : 8801034E436172642020FDA43660919F

[eMMC] : FLASH_EXT : 0x00200000 , 0x00200000 , 0x00020000

[eMMC] : FLASH_LEN : 0x00000001CE100000

[eMMC] : FLASH_UCP : 7393 MiB

INT RAM : 0x00020000

EXT RAM : 0x20000000

BOOT TYPE : EMMC_FLASH_BOOT

SOC VERIFY : C1

Boot Ok!

[AP] : Initial info read Ok!

Brand : alps

ProdName : m874l

ProdModel : TM-MID792

Device : m874l

AndroidVer: 4.2.2

MTKxCPU : MT6582

MTKxPRJ : ALPS.JB5.TABLET.MP.V1

MODEM :

BaseBand : MT6582_S00_MOLY_WR8_W1315_MD_WG_MP_V12_1_wg_n

Done!

Elapsed: 00:00:10

Reconnect Power/Cable!

Operation : Remove Viruses [SmartAV] [ v1.40 ]

SmartAV Conf : 100/80/2000

1. Power Off Phone , Remove battery , Insert back

2. Insert USB cable. In some cases require hold BootKey

Wait for phone...

Phone found! [ 21 ]

Sync...

Inital regs read done

Boot Info :

BB_CPU_ID : 6582

BB_CPU_HW : CA01

BB_CPU_SW : 8A00

BB_CPU_SB : 0001

BB_CPU_NM : [MediaTek] MT6582_S00

Processing BROM stage

SecCfgVal : 0x00000000

BromVersion : 0xFF

BLVersion : 0x01

Preloader Status : Alive

Processing DA stage

DA Select done , sending

DA Ver : MTK_AllInOne_DA_v5.1540.01.01

NAND_ID : 00000000000000000000000000000000

eMMC_ID : 8801034E436172642020FDA43660919F

DA Stat : v4.2 on BBID : 0x87

DA Sent. Configure setting now ...

DA started successuflly

eMMC FlashIC initialized

[eMMC] : FLASH_VEN : 0088 , OEM : 0103

[eMMC] : FLASH_INF : [FORESEE] , draC

[eMMC] : FLASH_CID : 8801034E436172642020FDA43660919F

[eMMC] : FLASH_EXT : 0x00200000 , 0x00200000 , 0x00020000

[eMMC] : FLASH_LEN : 0x00000001CE100000

[eMMC] : FLASH_UCP : 7393 MiB

INT RAM : 0x00020000

EXT RAM : 0x20000000

BOOT TYPE : EMMC_FLASH_BOOT

SOC VERIFY : C1

Boot Ok!

SmartAV Init Ok!

Scanning FileSystem now , please wait

Scan Done, infected files found : 1

Removing infected files and scripts ...

SmartAV Report : Removed 1 infected files!

Making additional operations ...

Special Op #1 : Clear Recovery Data Ok!

Special Op #2 : Clear UserData Ok!

Special Op #3 : PostFix Ok!

Done!

Done!

Elapsed: 00:00:52

Reconnect Power/Cable!

 

 

 

 

 

Did you even try check about other options, like AppScanner and use it? Manual on support.

 

 

 

 

allflashfiles st

n" name="IL_IN_TAG" value="2"/>
Gsm Somadhan About Admin Helo My Web Browse Im Try To Help My All Gsm Frands.And My Site All Firmware.Stock Rom.Solution.Flash FIle And Others Link Im Post In Free But My Any Link ( Password.Dead.Boken ) To Please Comment Me Im Trying To 1-24 hours Sulve Problem And Trying Post New Link Thanks... http://repairandroidphone.blogspot.com /http://allflashfilesst.blogspot.com/ All Samsung Root File Suport Here All Samsung Z3x Pro Octopus Volcano Merapi Tools Miracle Box Setup GsmAladin Key CS Tool Nck Box Update All Samsung Lollipop Kitkat Version Full Flash File Download All Symphony Walton Micromax Maximus Lava Okapia Oppo Samsung Clone Download All Stock Room Coustom Root Here Site All Box Latest Crack Download Here 100% Free How To Work Updating Phone Updating Your All Box Setup Samsung Twrp Super-Su Latest Version Download Suport 4.4.4 5.0 5.1.1 .

0 comments:

Post a Comment

 

Copyright @ 2013 All SMARTPHONE FLASH FILE All .

Designed by google | google