Есть китаец, подделка под lenovo с вирусами. После удаления вирусов cm2 mtk перестает включаться, через Smart Av и через Scan. Поднимается слитым с него фулом. Пробовал разные версии результат тот же-невкл

Полный текст

wait for phone...
Phone found! [ 5 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 6572
BB_CPU_NME : [MediaTek] MT6572_S00
BB_CPU_EXT : 0xCA01 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with SPRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1612.01.01
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x88
NAND Flash : NOT INSTALLED
eMMC Flash : 45010053454D3034473A93AC9875B225
Initialize Memory ...
DRAM already initialized by Preloader
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x45 , OEM : 0100
[eMMC] : FLASH_INF : [SANDISK] , G40ME
[eMMC] : FLASH_CID : 45010053454D3034473A93AC9875B225
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00200000
[eMMC] : FLASH_LEN : 0x00000000EC000000
[eMMC] : FLASH_UCP : 3776 MiB [eMMC 4 GiB]
DEV RID : DA7FF4D24A1CF778A28D09B8D54B18D4
INT RAM : 0x00020000
EXT RAM : 0x20000000
BOOT TYPE : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

[AP] : Initial info read Ok!

Brand : G650
ProdName : G650
ProdModel : G650
Device : G650
AndroidVer: 4.4.2
MTKxCPU : MT6572
MTKxPRJ : ALPS.KK1.MP7.V1

SECURITY :
IMEI_SW [1] :
IMEI_SW [2] :
BTMAC Addr : E6614665729F
WiFi MAC : 00C121C0B886

MODEM :
BaseBand : MT6572_S00_MOLY_WR8_W1315_MD_WG_MP_V43_1_wg_n

EXTRA :
LCD [0] : otm9605a_qhd_dsi_vdo
LCD [1] : rm68191_qhd_dsi_vdo
LCD [2] : nt35517_qhd_dsi_vdo
LCD [3] : hx8389b_qhd_dsi_vdo
LCD [4] : hx8389c_qhd_dsi_vdo
LCD [5] : hx8389c_v2_qhd_dsi_vdo
LCD [6] : sh1286_qhd_dsi_vdo
LCD [7] : jd9261_qhd_dsi_vdo_adc
LCD Res : 960x540
TOUCH [0] : ft6336_gesture
TOUCH [1] : GT9XX
TOUCH [2] : msg2233
CAM [0] : gc0328_yuv
CAM [1] : gc0329_yuv
CAM [2] : ov7676_yuv
CAM [3] : gc2145mipi_yuv
CAM [4] : gs5604mipi_yuv
CAM [5] : ov5645_mipi_yuv
CAM [6] : bf3703_yuv
CAM [7] : bf3a20_mipi_yuv
MODEM : yuanda72_cwet_kk_hspa_850_2100
LOCALE : en_US es_ES zh_CN zh_TW ru_RU pt_BR fr_FR de_DE tr_TR it_IT in_ID ms_MY vi_VN ar_EG th_TH pt_PT nl_NL el_GR hu_HU tl_PH ro_RO cs_CZ iw_IL my_ZG km_KH ko_KR pl_PL es_US bg_BG hr_HR lv_LV lt_LT sk_SK uk_UA de_AT da_DK fi_FI nb_NO sv_SE en_GB fa_IR hi_IN bn_IN
Elapsed: 00:00:29
Reconnect Power/Cable!

Wait for phone...
Phone found! [ 5 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 6572
BB_CPU_NME : [MediaTek] MT6572_S00
BB_CPU_EXT : 0xCA01 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with SPRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1612.01.01
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x88
NAND Flash : NOT INSTALLED
eMMC Flash : 45010053454D3034473A93AC9875B225
Initialize Memory ...
DRAM already initialized by Preloader
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x45 , OEM : 0100
[eMMC] : FLASH_INF : [SANDISK] , G40ME
[eMMC] : FLASH_CID : 45010053454D3034473A93AC9875B225
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00200000
[eMMC] : FLASH_LEN : 0x00000000EC000000
[eMMC] : FLASH_UCP : 3776 MiB [eMMC 4 GiB]
DEV RID : DA7FF4D24A1CF778A28D09B8D54B18D4
INT RAM : 0x00020000
EXT RAM : 0x20000000
BOOT TYPE : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

SmartAV Init Ok!
Scanning FileSystem now , please wait
Scan Done, infected files found : 12
Removing infected files and scripts ...

SmartAV Report : Removed 12 infected files!

Making additional operations ...
Special Op #1 : Clear Recovery Data Ok!
Special Op #2 : Clear UserData Ok!
Special Op #3 : PostFix Ok!

Done!
[свернуть]


Как удалить с него вирусы?