Lenono a536 monkey virus done

Analysis of USB port,Please insert phone USB cable.
Connecting…
CPU TYPE:MT6582
Hardware version:CA01
Software version:0001
SecCfgVal :0x00000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading complete!
EMMC_ID:0x1501004B3758564D4201D671D4EA9187
EMMC_PRODUCT_NAME: SAMSUNG :0x4B3758564D42
EMMC_BOOT1_SIZE: 0x00400000
EMMC_BOOT2_SIZE: 0x00400000
EMMC_PRMB_SIZE: 0x00080000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x1D2000000(7.28 G)

Analysis of system files…
PRELOADER: addr:0x000000 –length:0x1400000
MBR: addr:0x1400000 –length:0x080000
EBR1: addr:0x1480000 –length:0x080000
PRO_INFO: addr:0x1500000 –length:0x300000
NVRAM: addr:0x1800000 –length:0x500000
PROTECT_F: addr:0x1D00000 –length:0xA00000
PROTECT_S: addr:0x2700000 –length:0xA00000
SECCFG: addr:0x3100000 –length:0x020000
UBOOT: addr:0x3120000 –length:0x060000
BOOTIMG: addr:0x3180000 –length:0x1000000
RECOVERY: addr:0x4180000 –length:0x1000000
SEC_RO: addr:0x5180000 –length:0x600000
MISC: addr:0x5780000 –length:0x080000
LOGO: addr:0x5800000 –length:0x300000
EXPDB: addr:0x5B00000 –length:0xA00000
ANDROID: addr:0x6500000 –length:0x80000000
CACHE: addr:0x86500000 –length:0x7E00000
USRDATA: addr:0x8E300000 –length:0x43080000
BMTPOOL: addr:0xFFFF00A8 –length:0x000000

Format addr:0x8E300000 –Format length:0x43080000
Read phone information success.
Check the data complete.
Clear virus complete.
>>Before power on the phone, please do a format, clear the user data…

Analysis of USB port,Please insert phone USB cable.
Connecting…
CPU TYPE:MT6582
Hardware version:CA01
Software version:0001
SecCfgVal :0x00000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading complete!
EMMC_ID:0x1501004B3758564D4201D671D4EA9187
EMMC_PRODUCT_NAME: SAMSUNG :0x4B3758564D42
EMMC_BOOT1_SIZE: 0x00400000
EMMC_BOOT2_SIZE: 0x00400000
EMMC_PRMB_SIZE: 0x00080000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x1D2000000(7.28 G)

Analysis of system files…
PRELOADER: addr:0x000000 –length:0x1400000
MBR: addr:0x1400000 –length:0x080000
EBR1: addr:0x1480000 –length:0x080000
PRO_INFO: addr:0x1500000 –length:0x300000
NVRAM: addr:0x1800000 –length:0x500000
PROTECT_F: addr:0x1D00000 –length:0xA00000
PROTECT_S: addr:0x2700000 –length:0xA00000
SECCFG: addr:0x3100000 –length:0x020000
UBOOT: addr:0x3120000 –length:0x060000
BOOTIMG: addr:0x3180000 –length:0x1000000
RECOVERY: addr:0x4180000 –length:0x1000000
SEC_RO: addr:0x5180000 –length:0x600000
MISC: addr:0x5780000 –length:0x080000
LOGO: addr:0x5800000 –length:0x300000
EXPDB: addr:0x5B00000 –length:0xA00000
ANDROID: addr:0x6500000 –length:0x80000000
CACHE: addr:0x86500000 –length:0x7E00000
USRDATA: addr:0x8E300000 –length:0x43080000
BMTPOOL: addr:0xFFFF00A8 –length:0x000000

Read phone information success.
Format range: Start Address: 0x8E300000,Format Length :0x43080000
Flash erasing complete!
Check the data complete.

Please take out SIM and Memory card from phone when power on first time, or it will have Memory Lock .
>>If you meet Memory Lock,please take all cards from phone and restart phone again.

tnx merapi team