подскажите тело в контакте при включении вот лог
MCU SW : V 5.53 20-07-06 RH-93 (c) NMP
PPM SW : V 5.53 20-07-06 RH-93 (c) NMP UA
Prd.Code: 0532991
Bpr.Code: 0532665
Prod.Sn : VF2960232
HW Vers : 0502
UEM : 1328
UPP : 8705 [2201]
RFIC Ver: 0500
DSP Vers: P05w06.v34
LCD Type: WINTK:SYRS01
IMEI : 356421-01-988943-3
SL Conf : FFF-FF-FFFFFFFFFFF
SL Prof : 000000000001000-0
SL Var : 00003564210198894300
SL Aux : 00020000
HW Sig : 3AC56303B44E1BF0
Box Id : FFFFFFFFFFFFFFFF
SL Data Corrupted
MastCode: 27 63 50 45 20
Provider: Not Found
#pw+ 047 563 661 577 271 +1#
#pw+ 056 233 175 464 245 +2#
#pw+ 413 837 334 160 340 +3#
#pw+ 052 963 577 061 475 +4#
#pw+ 829 111 646 773 127 +5#
#pw+ 755 960 276 371 173 +6#
#pw+ 015 523 330 327 437 +7#
прошивал, влил РМ, Factory full reset не помогает вот лог mx-key
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.8336(03-05-2010), 1.0.0.12955(03-05-2010)
Rpl backup already exist (C:\mobileEx\3.4\data\backup\35642101988943_BACK.r pl).
Processing file: rh93_07.020 as MCU
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00D839D9:2984DA60
Area [01000000-0100FFFF] erased in 0.484 s
Area [01010000-013BFFFF] erased in 26.344 s
Area [013C0000-013EFFFF] erased in 1.375 s
Area [017C0000-017EFFFF] erased in 0.110 s
Area [01FC0000-01FEFFFF] erased in 0.156 s
Flash programming ...
Programming completed in 15.234 s
File Processed in 57.531 s
Processing file: rh930_nai7.02ej as CNT
[DCT4,DCT4 ALGORITHM] size: 155.11 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00D839D9:2984DA60
Area [01380000-013BFFFF] erased in 1.796 s
Flash programming ...
Programming completed in 1.281 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.047 s
File Processed in 17.906 s
Processing file: rh93_07.02ej as PPM
[DCT4,DCT4 ALGORITHM] size: 1.48 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00D839D9:2984DA60
Area [011E0000-011EFFFF] erased in 0.484 s
Area [011F0000-0137FFFF] erased in 11.203 s
Flash programming ...
Programming completed in 11.906 s
File Processed in 35.656 s
Flashing completed in 1 min 51.875 s

After Flash Processing ...
Reseting Factory Values OK.

Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35642101988943-3
Product Code: 0532991
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: EJ
Language Pack:
English,Russian,Ukrainian
Update SpLock не проходит
Imei net: 35642101988943
Version:
Counter: 0/3, 0/10

CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000

BLOCK 1: 1.CORRUPTED
Total time to process is 1 min 59.078 s
Update SpLock не проходит
Imei net: 35642101988943
Version:
Counter: 0/3, 0/10

CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000

BLOCK 1: 1.CORRUPTED

Calculating SIMLOCK RPL using security server ...
SERVER->Served by MXKEY - BLADE X at host2, agent version 1.1 revision 0.0
[CR1]DCT4PLUS remaining credit: 47

Rpl backup saved to "C:\mobileEx\3.4\data\backup\RH-93_35642101988943_SIM.RPL"

Updating SIMLOCK ...ERROR: 01

Reading Simlock info ...
Imei net: 35642101988943
Version:
Counter: 0/3, 0/10

CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000

BLOCK 1: 1.CORRUPTED