micromax a210 remove viruses in seconds

Operation : Check / Read Info [ v1.40 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone…
Phone found! [ 27 ]
Sync…
Inital regs read done
Boot Info :
BB_CPU_ID : 6583
BB_CPU_HW : CA01
BB_CPU_SW : 8A00
BB_CPU_SB : 0001
BB_CPU_NM : [MediaTek] MT6583|6589_S00
Processing BROM stage
SecCfgVal : 0x00000000
BromVersion : 0xFF
BLVersion : 0x01
Preloader Status : Alive
Processing DA stage
DA Select done , sending
DA Ver : MTK_AllInOne_DA_v5.1540.01.01
NAND_ID : 00000000000000000000000000000000
eMMC_ID : 3000011139473631D5A200329B708664
DA Stat : v3.2 on BBID : 0x86
DA Sent. Configure setting now …
DA started successuflly
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0011 , OEM : 0100
[eMMC] : FLASH_INF : [TOSHIBA] , 29G61
[eMMC] : FLASH_CID : 11010030313647393200A2D56486709B
[eMMC] : FLASH_EXT : 0x00400000 , 0x00400000 , 0x00080000
[eMMC] : FLASH_LEN : 0x00000003AB400000
[eMMC] : FLASH_UCP : 15028 MiB
INT RAM : 0x00020000
EXT RAM : 0x80000000
BOOT TYPE : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

[AP] : Initial info read Ok!

Brand : micromax
ProdName : A250
ProdModel : A250
Device : A250
AndroidVer: 4.2.1
MTKxCPU : MT6589
MTKxPRJ : ALPS.JB2.MP.V1.2

Done!
Elapsed: 00:00:10
Reconnect Power/Cable!

Operation : Remove Viruses [SmartAV] [ v1.40 ]
SmartAV Conf : 100/80/2000

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone…
Phone found! [ 27 ]
Sync…
Inital regs read done
Boot Info :
BB_CPU_ID : 6583
BB_CPU_HW : CA01
BB_CPU_SW : 8A00
BB_CPU_SB : 0001
BB_CPU_NM : [MediaTek] MT6583|6589_S00
Processing BROM stage
SecCfgVal : 0x00000000
BromVersion : 0xFF
BLVersion : 0x01
Preloader Status : Alive
Processing DA stage
DA Select done , sending
DA Ver : MTK_AllInOne_DA_v5.1540.01.01
NAND_ID : 00000000000000000000000000000000
eMMC_ID : 3000011139473631D5A200329B708664
DA Stat : v3.2 on BBID : 0x86
DA Sent. Configure setting now …
DA started successuflly
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0011 , OEM : 0100
[eMMC] : FLASH_INF : [TOSHIBA] , 29G61
[eMMC] : FLASH_CID : 11010030313647393200A2D56486709B
[eMMC] : FLASH_EXT : 0x00400000 , 0x00400000 , 0x00080000
[eMMC] : FLASH_LEN : 0x00000003AB400000
[eMMC] : FLASH_UCP : 15028 MiB
INT RAM : 0x00020000
EXT RAM : 0x80000000
BOOT TYPE : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

SmartAV Init Ok!
Scanning FileSystem now , please wait
Scan Done, infected files found : 14
Removing infected files and scripts …

SmartAV Report : Removed 14 infected files!

Making additional operations …
Special Op #1 : Clear Recovery Data Ok!
Special Op #3 : PostFix Ok!

Done!

Done!
Elapsed: 00:01:08
Reconnect Power/Cable!

Operation : Format FileSystem [ v1.40 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone…
Phone found! [ 27 ]
Sync…
Inital regs read done
Boot Info :
BB_CPU_ID : 6583
BB_CPU_HW : CA01
BB_CPU_SW : 8A00
BB_CPU_SB : 0001
BB_CPU_NM : [MediaTek] MT6583|6589_S00
Processing BROM stage
SecCfgVal : 0x00000000
BromVersion : 0xFF
BLVersion : 0x01
Preloader Status : Alive
Processing DA stage
DA Select done , sending
DA Ver : MTK_AllInOne_DA_v5.1540.01.01
NAND_ID : 00000000000000000000000000000000
eMMC_ID : 3000011139473631D5A200329B708664
DA Stat : v3.2 on BBID : 0x86
DA Sent. Configure setting now …
DA started successuflly
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0011 , OEM : 0100
[eMMC] : FLASH_INF : [TOSHIBA] , 29G61
[eMMC] : FLASH_CID : 11010030313647393200A2D56486709B
[eMMC] : FLASH_EXT : 0x00400000 , 0x00400000 , 0x00080000
[eMMC] : FLASH_LEN : 0x00000003AB400000
[eMMC] : FLASH_UCP : 15028 MiB
INT RAM : 0x00020000
EXT RAM : 0x80000000
BOOT TYPE : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

Clear USERDATA
Clear Ok!
Clear CACHE
Clear Ok!

Done!
Elapsed: 00:00:45
Reconnect Power/Cable!