http://www.myde-tech.com/product-category/cell-phone-batteries/tricell-extended-batteries
As ZL, now has a company "MYDE" released a large capacity batteries used in note 3. But this company's products look more beautiful and more light.I would like to buy one, what do you think?
I think I will not buy one.
No reviews and I no faith in a company that has a website in English yet won't hire an English speaking translator.
I think I would like to buy one to test it out, this company referred to in the messages to my subscription, in fact they invented tricll battery for smartphone.
Their boss, Mr Wei Chen is United States patent number US D700,139 S1 inventor, because of the ZL is their customer, so is ZL in the United States registered a patent.
I go check the patents. It is true, Wei Chen is a patented inventor. MYDE company, also they are developing some of the most creative new products. It is worth waiting for. Like their super power bank.
everybady, if you use tricell battery which made for Galaxy Note 4 can not read properly through andriod, please go to visit our website (myde-tech.com)and find Galaxy note 4 tricell battery page. There have another metherd to resolve this issue.
myde tricell battery
I think go for it. The only drag is the shipping parcels through DHL are a bit pricey( I choose snail mail ha )
Anyways the TPU cover for this battery is definitely something to consider. I own a zerolemon for my note 3 and the truth is the case is horrendous, it cracks way too easily, extremely brittle and the contact points from Zerolemon's plastic frame are very easy to break. MYDE apparently uses a thick soft TPU cover. As for the MYDE battery being nearly identical to zerolemon's it came as a surprise to know they are from the same parent company.
They seem like trustworthy people, they sent me a tracking number for my package. I'll just have to wait to see if they fulfill theyre end of the bargain.
In the title of the product it says 10,000mAh, but the item description only claims 6800mAh. So which is it? probably the 6800mAh?
savergn said:
In the title of the product it says 10,000mAh, but the item description only claims 6800mAh. So which is it? probably the 6800mAh?
Click to expand...
Click to collapse
I think it's just a typo, I just emailed them and await their response. I plan to do a youtube video demonstrating the differences between the 2 products.(Maybe this will clarify the doubts)
One thing is for sure Zerolemon is more known in the Americas. I just can't get over the plastic frame zerolemon has. Its really weak. Thier note 4 rugged cases arent rugged at all either(again with the easy to crack cheapo plastic frame)
I do ponder whether the zerolemon battery will fit with myde's TPU case, and if it doesn't oh well. I mainly purchased this battery out of curiosity. That and I'm a tech enthusiast .
---------- Post added at 04:59 AM ---------- Previous post was at 04:32 AM ----------
foxtaur said:
Hi Jorge,
Thanks for your kindly reminding. This Note 3 tricell battery capacity is 10000mAh, that descriptions is a mistake. We have updated it yet. sorry aout that. Thanks a million again for you support us!
Best Regards
Nick
Click to expand...
Click to collapse
Judging from the syntax I think the website for MYDE is in huge need of some improvements but its far from terrible. I don't think their dishonest, they responded quickly and yes "garyfunk" has reason to not trust them as a "bona fide" business. I do think mistakes happen. I'm excited on my end to recieve this battery, im eager to make a youtube video.
myde tricell TPU
OK so I just got the battery and TPU cover and I have to say it's kinda mixed bags how I feel regarding the cases.
On one hand I expected the TPU cover to feel softer and hence less secure than zerolemons hardshell frame but it fits relatively well and the battery doesnt feel loose when its installed, its way thinner than zerolemons and has less of that "brick" feeling that zerolemon has with theirs.
I don't know what to say but given the circumstances and settings I'd be switching between both cases depending on my uses. I just wish Zerolemon had a better Zeroshock case is all. It's biggest disappointment is it's plastic is no otterbox and believe me once the plastic frame cracks severely it's very hard to superglue it back together,the battery at this point tends to disconnect from phones power contact pins and is annoying as heck, it's possible to repair but it cannot withstand multiple punishment like an otterbox casing.
NB = the MYDE battery is equally as remarkable as zerolemons(with both being made by MYDE its a given....duhhhh....)
Please allow me time to construct a video showing zerolemons and MYDE's offering. Work and summer classes have consumed most of my time
IF anyone can get an otterbox defender case modded to work with either of these behemoth batteries that would be super. For the meantime the MYDE TPU case is default until I brainstorm around this issue.
I'm a heavy phone user - calls, messages, email, games, etc - I use it almost constantly. With the stock battery, my phone was barely limping into a whole day - 12 hours or so, that is. I replaced it with the MYDE battery and oh my goodness, what an improvement! My phone now lasts for 3.5 days without requiring a recharge.
I would not buy it. Until there's good reviews
I'd like to, but how about QI? Working or not? NFC working is fine, but I more need QI ^^ I like my charging station...
won't use it, Anker 3200 mah offers good compromise and good battery life with undervoltages of CPU/GPU, imho
my myde battery arrived today and i just installed it and am charging it up. i will let you all know if it explodes.
powerbank also is a good option. remind to choose a reliable brand to avoid any unhappy incident.
emuandco said:
I'd like to, but how about QI? Working or not? NFC working is fine, but I more need QI ^^ I like my charging station...
Click to expand...
Click to collapse
I'm currently awaiting my ZeroLemon 10,000 mAh battery to arrive. It's currently in-transit.
Anyhow, once I receive it, I fully intend to mod the wireless charger receiver module that I currently use with my stock battery for use with the ZeroLemon battery. A few wires and some solder should do nicely.
Too bad we can't make use of the wireless quick charge with the Note 3.
Sent from my SM-N900W8 using Tapatalk
I modded an Otterbox to hold my anker double cap battery but I'm guess this battery is wide like the Zero lemon I had for my s4. I think you would have to cut too much of the Otterbox casing away for the case to be very sturdy
myde batteries
hello everyone
it is my first post on xda forum . i have just ordered a 10000mah battery from myde .Hope they will delivering on time and i can share my reviews about it.
garyfunk said:
I think I will not buy one.
No reviews and I no faith in a company that has a website in English yet won't hire an English speaking translator.
Click to expand...
Click to collapse
I think I won't either, considering that simply visiting their website caused MalwareBytes to block about a bazillion malicious requests.
<record port="52844" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="164ceaef-362a-4cea-9d19-be11635c66dc" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:23.839297-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52844" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="77cff499-22f5-4bc2-8771-6642d86e032b" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:23.946400-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52845" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="e6e3de8c-6bff-4d94-9be2-49fbd949514b" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:23.975928-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52846" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="9875f879-d8c0-4f14-989d-4d131438c614" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:24.001952-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52847" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="b5af7bf7-b60f-429e-8b24-2a18dd571fde" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:24.027977-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52848" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="4f12157b-5be2-4042-b2fa-0f19bba39ba1" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:24.055503-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52849" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="07dd7ab9-9bcd-4fcb-89a9-a7b743bb9ab0" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:24.082039-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52857" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="5496b667-314d-4b2c-af55-1a9cd42a6693" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:26.873230-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52914" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="3a05eb1b-f694-442e-b7a7-74bf8d4e2a46" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:26.909765-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52858" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="92403cfc-144d-45f8-bb01-5be01dca8338" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:26.935790-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52915" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="a3e1f2f6-619c-468b-ae60-f263ef226f6e" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:26.962817-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52859" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="6fe4a4c1-01ba-490f-bcd2-a7384af09077" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:26.988852-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52919" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="22573d1b-edd3-48f9-b5cd-ea8c4c86c4c8" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.015867-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52860" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="cd778817-5535-41c6-81ba-e38b0508d17f" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.041891-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52920" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="4dfb29c2-5849-46af-9b1c-e2437286574b" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.070419-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52861" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="658a944c-4ef7-44f7-818a-d15df6ec640c" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.100949-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52921" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="164b76e9-c1a8-4cea-9085-3a37c2504a1a" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.133980-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52862" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="412cd252-ab85-4da8-84b1-542a049565ba" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.164008-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52922" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="1bfc312c-66e7-49f6-85a6-08109f267a02" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.194037-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52863" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="c1ff5598-e81b-496c-88fa-2afd29f73352" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.227068-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52923" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="aec04a58-db93-4b40-bfbe-68d6c467cb9b" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.254594-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52924" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="2c14f8bb-1a44-47bb-9447-dc1375337033" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.288627-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52864" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="7c4e1604-dd25-43df-8e77-3d312f874171" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.317154-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52925" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="f0bea722-5fda-47d5-a52d-f978a358d9e0" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.344181-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52865" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="8194d8a9-2cd0-443f-86df-d14cfa0815aa" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.371206-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52926" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="380df3dc-ddb3-4898-8e80-6ee37dbc4b40" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.399232-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52866" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="29e55e74-994a-4cf5-864d-2aafc770557e" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.425258-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52927" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="990ae236-455b-4bdf-96ea-313743f12c7f" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.451795-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52867" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="b072e488-8ebc-46a0-a306-d397ff000a8a" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.478308-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52928" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="fe353c07-8084-4bd5-8a89-4deac834c8f3" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.505334-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52868" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="3e3d6373-7941-4319-bf98-745dc9a7b1d0" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.534863-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52929" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="571d3d80-749d-40c4-a815-b4c9e7f19973" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.561889-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52869" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="7191a441-0704-48f1-8212-df7a58737a4e" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.588423-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52930" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="ee3a9d8b-f1e9-49c2-a592-cad081ddebe8" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.616952-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52870" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="ac336480-0068-4262-a048-af2fb7e92bfa" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.644980-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52931" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="0efc5f36-9bcf-48f0-91a6-75f9c240868b" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.671994-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52871" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="e36f5ee8-d6b9-4778-ae10-d9a2205ce748" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.700032-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52932" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="f24e8ecc-402c-4b90-97a7-c7afc829d0b2" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.728548-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52872" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="c775bda9-0771-4c82-875d-dc3e9ef6af8a" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.755582-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52933" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="40989ec1-eef2-4738-8758-ce0093f1505f" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.784601-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52873" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="58eb7de8-24bf-4373-8b97-4497f150c75d" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.810626-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52934" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="3f3fb5fc-ce05-4624-9704-6d170cb2b5d4" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.837152-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52874" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="9eb5a7b5-b603-449b-af9a-b5f955bb9863" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.864689-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52936" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="aba26c4a-ff4b-44eb-a2bf-3e905a5b1043" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.891703-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52875" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="f34f5270-6bc3-4ea9-a897-96987aee06e1" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.918739-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52937" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="119a879a-306f-4b26-9fcc-d2c1dd357673" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.945255-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52876" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="5824fec9-d5eb-441f-8153-de33cbd8a446" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.972280-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52938" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="fe706e8b-5a79-47ab-97fb-b06a3632da77" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:27.999307-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52877" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="5b6136d1-a010-4cee-b59d-678b6d2179ab" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:28.025841-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52939" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="ce55c384-c56a-46a9-8c30-abc4707b9bcc" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:28.052857-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
<record port="52878" malwaretype="Domain" ip="115.231.158.70" domain="7xpwnn.com1.z0.glb.clouddn.com" direction="Outbound" subtype="Malicious Website Protection" last_modified_tag="c1830be5-a050-42ee-a4aa-951b6242036b" systemname="KRYSTALOGI-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2016-02-09T23:25:28.079392-08:00" LoggingEventType="0" process="C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" severity="debug"/>
Paulita1 said:
http://www.myde-tech.com/product-category/cell-phone-batteries/tricell-extended-batteries
As ZL, now has a company "MYDE" released a large capacity batteries used in note 3. But this company's products look more beautiful and more light.I would like to buy one, what do you think?
Click to expand...
Click to collapse
cool:fingers-crossed:
You can find exactly the same battery on Aliexpress but cheaper with free shipping
Related
So I have been reading through the threads for a short time I couldn't find a direct answer. I have a rooted AT&t x10 1.6, used z4root. Can I easily upgrade to 2.1? my Kernel verison: 2.6.29, Build number: R2CA016.
If I do upgrade are there major problems, I have been reading about, like video play back and bluetooth not working?
Thanks
Yes 10chars
XperiaX10iUser said:
Yes 10chars
Click to expand...
Click to collapse
What tutorial?
X10a SHIPPED 2.1 ROM - (FLASH TOOL INCLUDED) Thanks Bin4ry & TheLaser
X10a_2_0_A_0_504_GLOBAL
would it be this one
or the FlashToolRelease.zip?
http://forum.xda-developers.com/showthread.php?t=825201
Use the generic X10a fw.
You have to wipe your USERDATA !! This is important, otherwise you will enter Bootloops etc.
Also be sure SEUS is NOT running! (But at least it should have detected your phone once)
How do I wipe the USERDATA?
drozek said:
How do I wipe the USERDATA?
Click to expand...
Click to collapse
Run the flasher and follow the instructions.
27/021/2010 16:21:49 - INFO - Searching for Xperia....
I cannot get past this grrr!
drozek said:
27/021/2010 16:21:49 - INFO - Searching for Xperia....
I cannot get past this grrr!
Click to expand...
Click to collapse
Have you run SEUS up through flash mode? Need to do that at least one time to get right drivers loaded.
Do I have reflash the phone to 1.6 and erase all my contacts and what not?
now I get:
27/002/2010 20:02:27 - INFO - Flashing loader.sin ...
27/002/2010 20:02:29 - INFO - file amss_fs.sin not found. skip..
27/002/2010 20:02:29 - INFO - file cache.sin not found. skip..
27/002/2010 20:02:29 - INFO - file amss.sin not found. skip..
27/002/2010 20:02:29 - INFO - file fota0.sin not found. skip..
27/002/2010 20:02:29 - INFO - file fota1.sin not found. skip..
27/002/2010 20:02:29 - INFO - file dsp1.sin not found. skip..
27/002/2010 20:02:29 - INFO - file kernel.sin not found. skip..
27/002/2010 20:02:29 - INFO - file system.sin not found. skip..
27/002/2010 20:02:29 - INFO - file userdata.sin not found. skip..
27/002/2010 20:02:29 - INFO - Flashing finished.
drozek said:
now I get:
27/002/2010 20:02:27 - INFO - Flashing loader.sin ...
27/002/2010 20:02:29 - INFO - file amss_fs.sin not found. skip..
27/002/2010 20:02:29 - INFO - file cache.sin not found. skip..
27/002/2010 20:02:29 - INFO - file amss.sin not found. skip..
27/002/2010 20:02:29 - INFO - file fota0.sin not found. skip..
27/002/2010 20:02:29 - INFO - file fota1.sin not found. skip..
27/002/2010 20:02:29 - INFO - file dsp1.sin not found. skip..
27/002/2010 20:02:29 - INFO - file kernel.sin not found. skip..
27/002/2010 20:02:29 - INFO - file system.sin not found. skip..
27/002/2010 20:02:29 - INFO - file userdata.sin not found. skip..
27/002/2010 20:02:29 - INFO - Flashing finished.
Click to expand...
Click to collapse
You have to load your target firware (X10a Generic-World) into the firmware folder - all not just .sin. The flash tool only found the loader.sin
drozek said:
Do I have reflash the phone to 1.6 and erase all my contacts and what not?
Click to expand...
Click to collapse
No,
Yes - use bakup/restore or sync.
Hello, sorry for my bad english my native language is spanish so...
**Well my trouble is that i haven't understood all the instructions so i've messed up my MK16a, & i've installed the Rom & patch for Pro of PURENESS (b11) -> WHITOUT doing the apropiated kernell instalation D: now my phone starts and displays "Sony Ericcson" logo & then the screen gets black but it still on.
Now, i've already tryed using SEUS, PCcompanion, Flashtools to recover it. nothing works because it "doesnt recognize the USB device"
I went throught gordon's gate & even tryed to put in manually the missing driver (SEMC.dll)
I dont know what else can i do... ill never try to set a rom in it if i can fix my phone T^T
PS: ive tryed to do all the above in my brother's laptop too .-. i think my phone wants to stay dead
Tank you for reading :cyclops:
Try flashing the stick ftf using flashtool.
Or if your bootloader is unlocked try flashing the kernel needed and reboot.
Regards
N
mnishamk said:
Try flashing the stick ftf using flashtool.
Or if your bootloader is unlocked try flashing the kernel needed and reboot.
Regards
N
Click to expand...
Click to collapse
As i said Flashtools dont recognize it due to the SEMC driver i guess its the 1st step to fix the phone still i dont know how
RoyalKrow said:
As i said Flashtools dont recognize it due to the SEMC driver i guess its the 1st step to fix the phone still i dont know how
Click to expand...
Click to collapse
install drivers located in flashtool directory :good:
piousheart said:
install drivers located in flashtool directory :good:
Click to expand...
Click to collapse
I've done it and now flashtools DO recognize the phone in flashmode but i tryed to flash a debranded GB tft and got this log:
18/024/2013 03:24:11 - INFO - <- This level is successfully initialized
18/024/2013 03:24:11 - INFO - Flashtool Version 0.9.0.0 built on 2012-07-19 22:57:15
18/024/2013 03:24:11 - INFO - You can drag and drop ftf files here to start flashing them
18/024/2013 03:24:16 - INFO - Device connected in flash mode
18/024/2013 03:24:17 - DEBUG - (MyLogger.java:106) - <- This level is successfully initialized
18/024/2013 03:24:19 - INFO - (Device.java:130) - List of connected devices (Device Id) :
18/024/2013 03:24:19 - INFO - (Device.java:138) - - USB\VID_0FCE&PID_ADDE\5&1B71DC9C&0&2 Driver installed : true
18/024/2013 03:24:19 - INFO - (Device.java:140) - List of ADB devices :
18/024/2013 03:24:19 - DEBUG - (ProcessBuilderWrapper.java:93) - List of devices attached
18/024/2013 03:24:19 - INFO - (Device.java:147) - - none
18/024/2013 03:24:19 - INFO - (Device.java:148) - List of fastboot devices :
18/024/2013 03:24:20 - INFO - (Device.java:155) - - none
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:102) - Adding MK16a_2.3.4_TELCEL.ftf to list of firmwares
18/024/2013 03:24:36 - DEBUG - (Bundle.java:63) - Creating bundle from ftf file : C:\Flashtool\firmwares\MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : fota0.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : loader.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : kernel.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : adsp.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : amss_fs_iyokan.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : apps_log.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : fota1.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : cache.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : simlock.ta
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : userdata.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : amss.sin
18/024/2013 03:24:36 - DEBUG - (Bundle.java:74) - Added this entry to the bundle list : system.sin
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding system.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding kernel.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding userdata.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding adsp.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding amss_fs_iyokan.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding amss.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding cache.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding loader.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding fota0.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding fota1.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding simlock.ta to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:36 - DEBUG - (firmSelect.java:137) - Adding apps_log.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding system.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding kernel.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding adsp.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding amss_fs_iyokan.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding amss.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding cache.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding loader.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding fota0.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding fota1.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding simlock.ta to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding apps_log.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding system.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding kernel.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding adsp.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding amss_fs_iyokan.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding amss.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding loader.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding fota0.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding fota1.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding simlock.ta to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:38 - DEBUG - (firmSelect.java:137) - Adding apps_log.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding system.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding kernel.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding adsp.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding amss_fs_iyokan.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding amss.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding loader.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding fota0.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding fota1.sin to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:39 - DEBUG - (firmSelect.java:137) - Adding simlock.ta to the content of MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:42 - DEBUG - (firmSelect.java:359) - Choosed bundle MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:42 - INFO - (firmSelect.java:360) - Selected MK16a_2.3.4_TELCEL.ftf
18/024/2013 03:24:42 - INFO - (FlasherGUI.java:1084) - Preparing files for flashing
18/024/2013 03:24:42 - DEBUG - (Bundle.java:275) - Created the prepared folder
18/024/2013 03:24:42 - DEBUG - (Bundle.java:226) - Saving entry system.sin to disk
18/024/2013 03:24:42 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : system.sin
18/024/2013 03:24:42 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\system.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry kernel.sin to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : kernel.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\kernel.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry adsp.sin to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : adsp.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\adsp.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry amss_fs_iyokan.sin to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : amss_fs_iyokan.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\amss_fs_iyokan.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry amss.sin to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : amss.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\amss.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry loader.sin to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : loader.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\loader.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry fota0.sin to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : fota0.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\fota0.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry fota1.sin to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : fota1.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\fota1.sin
18/024/2013 03:24:43 - DEBUG - (Bundle.java:226) - Saving entry simlock.ta to disk
18/024/2013 03:24:43 - DEBUG - (BundleEntry.java:38) - Streaming from jar entry : simlock.ta
18/024/2013 03:24:43 - DEBUG - (Bundle.java:229) - Writing Entry to .\firmwares\prepared\simlock.ta
18/024/2013 03:24:43 - INFO - (FlasherGUI.java:1088) - Please connect your device into flashmode.
18/024/2013 03:24:44 - INFO - (USBFlashWin32.java:18) - Opening device for R/W
18/024/2013 03:24:44 - INFO - (X10flash.java:343) - Start Flashing
18/024/2013 03:24:44 - INFO - (X10flash.java:230) - Flashing loader
18/024/2013 03:24:44 - DEBUG - (BundleEntry.java:34) - Streaming from file : .\firmwares\prepared\loader.sin
18/024/2013 03:24:44 - INFO - (X10flash.java:388) - Ending flash session
18/024/2013 03:24:44 - ERROR - (X10flash.java:365) -
18/024/2013 03:24:44 - ERROR - (X10flash.java:366) - Error flashing. Aborted
18/024/2013 03:24:44 - INFO - (FlasherGUI.java:835) - Device connected in flash mode
try reinstalling sony pc companion for drivers or fixing it from there (there is a guide on youtube)
There is an official Sony guide how to unlock a bootloader. There you can get information how to make flashtool work when your phone is connected via fastboot, because it won't work with any drivers, you need to install them manually.
Update your PC companion if needed or reinstall it..
open flashtool..
turn off your phone & put if in a flash mode. . .
than let your pc install drivers itself
now flash it using flashtool
Hmmm......
1.disconnect your phone from your pc and turn your phone off...
2.open flashtool....
3.click on the flash icon and select flashmode....
4.select stock rom (ttf) that you want to flash....
5.at wipe section tick all option, at exclude section untick all and untick no final verifications....
6.once you have selected which ttf you wanna flash click "ok"...
7.let flashtool prepare all the necessary files first....
8.a popup will appear asking you to connect your phone in flashmode....
9.it will show to connect it while holding back button (ignore it, connect it while holding volume down)
10.if you done it right the flashing will begin....
that is the proper way to flash ttf using flashtool...never connected your phone before step 8....if you do then you will have error while flashing...
LJegenda said:
try reinstalling sony pc companion for drivers or fixing it from there (there is a guide on youtube)
Click to expand...
Click to collapse
---PCcompanion ask me access to the SD card lol it doesn't even go further than SE logo so can t use it
piousheart said:
Update your PC companion if needed or reinstall it..
open flashtool..
turn off your phone & put if in a flash mode. . .
than let your pc install drivers itself
now flash it using flashtool
Click to expand...
Click to collapse
---I've already reinstalled PCcompanion drivers still missing or something
outoflock377 said:
There is an official Sony guide how to unlock a bootloader. There you can get information how to make flashtool work when your phone is connected via fastboot, because it won't work with any drivers, you need to install them manually.
Click to expand...
Click to collapse
---I've installed manually ggsemc.dll at system folder .-. nothing
iPusak Gaoq™ said:
Hmmm......
1.disconnect your phone from your pc and turn your phone off...
2.open flashtool....
3.click on the flash icon and select flashmode....
4.select stock rom (ttf) that you want to flash....
5.at wipe section tick all option, at exclude section untick all and untick no final verifications....
6.once you have selected which ttf you wanna flash click "ok"...
7.let flashtool prepare all the necessary files first....
8.a popup will appear asking you to connect your phone in flashmode....
9.it will show to connect it while holding back button (ignore it, connect it while holding volume down)
10.if you done it right the flashing will begin....
that is the proper way to flash ttf using flashtool...never connected your phone before step 8....if you do then you will have error while flashing...
Click to expand...
Click to collapse
---Pressing vol. down dont do anything at my phone I'm able to get it flasmode but Not fastboot (menu key)
RoyalKrow said:
---PCcompanion ask me access to the SD card lol it doesn't even go further than SE logo so can t use it
---I've already reinstalled PCcompanion drivers still missing or something
---I've installed manually ggsemc.dll at system folder .-. nothing
---Pressing vol. down dont do anything at my phone I'm able to get it flasmode but Not fastboot (menu key)
Click to expand...
Click to collapse
For our pfones fatboot is vol up
And flashboot is vol down.
Also you need flashboot not fastboot for flashing ftf
Regards
N
At the device manager i found the semc usb whit a warning. I've looked at God Ggoogle for an answer & found gordon'sgate but it doesnt work at Windows8 so i manually put the DLL into the System folder... nothing
im thinking seriouslly about taking my phone to the service store now....even if i have to pay x,X
PS. i tryed to post an image to make it clearer but i dont have 10 posts yet xD
try instal driver in c:flashtool\driver\flashtool-driver.exe
Tick sony ericsron driver
Open flash tool - help - check driver
If detect, try use seus. Give a minute turn off before connect usb to phone
Sent from my SK17i using xda app-developers app
castangel said:
try instal driver in c:flashtool\driver\flashtool-driver.exe
Tick sony ericsron driver
Open flash tool - help - check driver
If detect, try use seus. Give a minute turn off before connect usb to phone
Sent from my SK17i using xda app-developers app
Click to expand...
Click to collapse
I'uninstalled and reinstalled PCcompanion SEUS ggsemc.dll & flashtool like 4 times each... and i do install flashtools drivers each time (did it again just in case .-.)
checked my drivers and got this log
19/052/2013 17:52:35 - INFO - (Device.java:130) - List of connected devices (Device Id) :
19/052/2013 17:52:35 - INFO - (Device.java:138) - - USB\VID_0FCE&PID_ADDE\5&1B71DC9C&0&2 Driver installed : true
19/052/2013 17:52:35 - INFO - (Device.java:140) - List of ADB devices :
19/052/2013 17:52:35 - DEBUG - (ProcessBuilderWrapper.java:93) - List of devices attached
19/052/2013 17:52:35 - INFO - (Device.java:147) - - none
19/052/2013 17:52:35 - INFO - (Device.java:148) - List of fastboot devices :
19/052/2013 17:52:35 - INFO - (Device.java:155) - - none
FIN
Ok, i've taken my SExPeriaPro to service & after 2hours of horrible wait they just gave me a sheet of paper saying "UNREPAIRABLE DUE TO SW INTERVENTION via CSE" holy s*** -.- and that was my last hope now i have a luxurious 5k pesos rock
Just got this now
https://mega.co.nz/#!qNUHXbRS!YE_pDxqdLfZ1KSZ_Q2uV4RWZfglk3w1vD0OVyqYTT1c
H786 said:
Just got this now
https://mega.co.nz/#!qNUHXbRS!YE_pDxqdLfZ1KSZ_Q2uV4RWZfglk3w1vD0OVyqYTT1c
Click to expand...
Click to collapse
Thanks
Feodorus 4PDA said:
For C6802 or C6833?
Click to expand...
Click to collapse
Please read the thread title ... its for C6833
H786 said:
Please read the thread title ... its for C6833
Click to expand...
Click to collapse
C6802 is compatible or not .
jasonyu007 said:
C6802 is compatible or not .
Click to expand...
Click to collapse
The 4.3 ones were, so this one MIGHT be, just wait for someone more game than you to try
did anyone successfully flash this? flashtool disconnected my phone and said it couldnt open the bundle =( (using flash tool 9.13)
caesu said:
did anyone successfully flash this? flashtool disconnected my phone and said it couldnt open the bundle =( (using flash tool 9.13)
Click to expand...
Click to collapse
Have to update to final version of Flashtool Version 0.9.15.0
Lc1975 said:
Have to update to final version of Flashtool Version 0.9.15.0
Click to expand...
Click to collapse
thank you i was wondering if that was the issue.
jasonyu007 said:
C6802 is compatible or not .
Click to expand...
Click to collapse
It is..... just flashed on Indian 6802.............But you need to have to be on latest flashtool 0.9.15...........
mathurmatt said:
It is..... just flashed on Indian 6802.............But you need to have to be on latest flashtool 0.9.15...........
Click to expand...
Click to collapse
So hows the first impression in c802?
Sent from my C6833 using xda app-developers app
mathurmatt said:
It is..... just flashed on Indian 6802.............But you need to have to be on latest flashtool 0.9.15...........
Click to expand...
Click to collapse
sorry,it only flashed on Indian 6802??Or you only test it on Indian 6802?How about EUR 6802??:angel:
H786 said:
Just got this now
https://mega.co.nz/#!qNUHXbRS!YE_pDxqdLfZ1KSZ_Q2uV4RWZfglk3w1vD0OVyqYTT1c
Click to expand...
Click to collapse
cool , thanks alot . this is hong kong ver. right ? but will this keep the root ? or i have to flash something else on top?
H786 said:
Just got this now
https://mega.co.nz/#!qNUHXbRS!YE_pDxqdLfZ1KSZ_Q2uV4RWZfglk3w1vD0OVyqYTT1c
Click to expand...
Click to collapse
Just flashed this, all is working, any idea on how to root it?
willhang said:
Just flashed this, all is working, any idea on how to root it?
Click to expand...
Click to collapse
For root see http://forum.xda-developers.com/showthread.php?t=2687549 but its only for Unlocked bootloader.
20/035/2014 16:35:16 - DEBUG - (MyLogger.java:100) - <- This level is successfully initialized
20/035/2014 16:35:16 - INFO - (MainSWT.java:829) - Flashtool Version 0.9.13.0 built on 2013-06-04 22:50:00
20/035/2014 16:35:17 - INFO - (MainSWT.java:125) - Device disconnected
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6602_10.1.A.1.434 INDIA_Unbranded.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_3.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-c6602-row_201301221311_10.1.A.1.434.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6602_10.3.1.A.2.67_1270-7937_Generic MEA.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_3.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-c6602-row_201305211510_10.3.1.A.2.67.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6603_10.4.B.0.569_Stripped.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_3.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : boot_delivery.xml
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-c6603-prototype_201305081233_10.4.B.0.569.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6833_14.1.B.1.532_Generic UK.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-C6833-row_201309031826.1_14.1.B.1.532.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cust-reset.ta
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fsg.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6833_14.2.A.0.290_CE.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-C6833-row_201310161732.1_14.2.A.0.290.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : boot_delivery.xml
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cust-reset.ta
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fsg.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6833_14.2.A.1.136_CE.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : boot_delivery.xml
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cust-reset.ta
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-C6833-row_201310161732.1_14.2.A.1.136.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fsg.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6833_14.3.A.0.681_LTE Germany.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-C6833-row_201310161732.1_14.3.A.0.681.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : boot_delivery.xml
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fota-reset.ta
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cust-reset.ta
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fsg.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\C6833_4.4.2_HK.ftf
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-C6833-row_201310161732.1_14.3.A.0.681.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : boot_delivery.xml
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fota-reset.ta
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cust-reset.ta
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fsg.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:27 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\X10_V1_BLRelock.ftf
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : s1boot.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\Xperia Z Ultra_4.3 1275-6410_Unbranded.ftf
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : elabel-C6833-row_201310161732.1_14.2.A.0.290.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : system.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : fotakernel.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : boot_delivery.xml
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_2.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cust-reset.ta
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fs_1.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : rpm.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : partition-image.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : apps_log.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : amss_fsg.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : userdata.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : cache.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\XperiaZ_C660X_KernelOnly_10.3.1.A.2.67.ftf
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:75) - Creating bundle from ftf file : E:\Xperia Z\Flashtool\firmwares\XperiaZ_C660X_KernelOnly_10.3.A.0.423_Generic_NL.ftf
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : loader.sin
20/035/2014 16:35:28 - DEBUG - (Bundle.java:91) - Added this entry to the bundle list : kernel.sin
20/035/2014 16:35:40 - INFO - (MainSWT.java:1061) - Selected C6833 / 4.4.2 / HK
20/035/2014 16:35:40 - INFO - (Bundle.java:405) - Preparing files for flashing
20/035/2014 16:35:41 - DEBUG - (Bundle.java:415) - Created the prepared folder
20/035/2014 16:35:41 - DEBUG - (Bundle.java:324) - Saving entry system.sin to disk
20/035/2014 16:35:41 - DEBUG - (BundleEntry.java:41) - Streaming from jar entry : system.sin
20/035/2014 16:35:41 - DEBUG - (Bundle.java:328) - Writing Entry to .\firmwares\prepared\system.sin
20/038/2014 16:38:09 - DEBUG - (Bundle.java:324) - Saving entry kernel.sin to disk
20/038/2014 16:38:09 - DEBUG - (BundleEntry.java:41) - Streaming from jar entry : kernel.sin
20/038/2014 16:38:09 - DEBUG - (Bundle.java:328) - Writing Entry to .\firmwares\prepared\kernel.sin
20/038/2014 16:38:09 - DEBUG - (Bundle.java:324) - Saving entry rpm.sin to disk
20/038/2014 16:38:09 - DEBUG - (BundleEntry.java:41) - Streaming from jar entry : rpm.sin
20/038/2014 16:38:09 - DEBUG - (Bundle.java:328) - Writing Entry to .\firmwares\prepared\rpm.sin
20/038/2014 16:38:09 - DEBUG - (Bundle.java:324) - Saving entry elabel-C6833-row_201310161732.1_14.3.A.0.681.sin to disk
20/038/2014 16:38:09 - DEBUG - (BundleEntry.java:41) - Streaming from jar entry : elabel-C6833-row_201310161732.1_14.3.A.0.681.sin
20/038/2014 16:38:09 - DEBUG - (Bundle.java:328) - Writing Entry to .\firmwares\prepared\elabel-C6833-row_201310161732.1_14.3.A.0.681.sin
20/038/2014 16:38:10 - DEBUG - (Bundle.java:324) - Saving entry boot_delivery.xml to disk
20/038/2014 16:38:10 - DEBUG - (BundleEntry.java:41) - Streaming from jar entry : boot_delivery.xml
20/038/2014 16:38:10 - DEBUG - (Bundle.java:328) - Writing Entry to .\firmwares\prepared\boot_delivery.xml
20/038/2014 16:38:13 - ERROR - (Bundle.java:439) - 1
20/038/2014 16:38:13 - INFO - (FlashJob.java:46) - Cannot open bundle. Flash operation canceled
this is the error i get. Why?
@muntaha_v3
Download latest flashtool version 0.9.15.0
techpal said:
@muntaha_v3
Download latest flashtool version 0.9.15.0
Click to expand...
Click to collapse
But I think i read somewhere it can hard brick your phone
muntaha_v3 said:
But I think i read somewhere it can hard brick your phone
Click to expand...
Click to collapse
Dont know so cant comment on this. If you have heard about it then dont do it.
techpal said:
Dont know so cant comment on this. If you have heard about it then dont do it.
Click to expand...
Click to collapse
Aapne kaise kiya??
@muntaha_v3
To install KitKat you have to install the latest version of Flashtool...
Long story short, I had some reasons to flash ST15i in past but had never seen this error before.
Log looks like that:
30/011/2018 02:11:11 - INFO - Selected Bundle for SonyEricson Xperia Mini(ST15i). FW release : 4.1.B.0.587. Customization : Unbranded
30/011/2018 02:11:11 - INFO - Preparing files for flashing
30/011/2018 02:11:27 - INFO - Please connect your device into flashmode.
30/011/2018 02:11:33 - INFO - Using Gordon gate drivers version 3.1.0.0
30/011/2018 02:11:33 - INFO - Opening device for R/W
30/011/2018 02:11:34 - INFO - Device ready for R/W.
30/011/2018 02:11:34 - INFO - Reading device information
30/011/2018 02:11:34 - INFO - Phone ready for flashmode operations.
30/011/2018 02:11:34 - INFO - Opening TA partition 2
30/011/2018 02:11:34 - INFO - Current device : ST15i - BX902U4NMR - 1248-9812_R3I - 1244-2098_4.1.B.0.587 - WORLD-i_4.1.B.0.587
30/011/2018 02:11:34 - INFO - Closing TA partition
30/011/2018 02:11:35 - INFO - Start Flashing
30/011/2018 02:11:35 - INFO - Ending flash session
30/011/2018 02:11:35 - ERROR - Not a sin file
30/011/2018 02:11:35 - ERROR - Error flashing. Aborted
I use the latest version of flashtool, because previous one cannot sync with github what gives me additional errors.
My question is what does that "Not a sin file" error mean and what causes it (except for my inability to see some obvious things).
Thanks in advance.
Jahsehah said:
Long story short, I had some reasons to flash ST15i in past but had never seen this error before.
Log looks like that:
<snip>
I use the latest version of flashtool, because previous one cannot sync with github what gives me additional errors.
My question is what does that "Not a sin file" error mean and what causes it (except for my inability to see some obvious things).
Thanks in advance.
Click to expand...
Click to collapse
Did you manage to solve this? Running into the same issue with my ST18i...
NadavCE said:
Did you manage to solve this? Running into the same issue with my ST18i...
Click to expand...
Click to collapse
Nope, I still havent.
Greetings everyone.
I Am Stuck in flashing Sony C5 ultra, The problem am facing is that the device is bootlooping on sony blue wave animation, and am able to enter both flashmod and Fastboot. in fastboot all commands are rendered as "not allowed".
i have tried all versions of falshtools listed below :
1-Flash_Tool_0.9.18.5
2-Flash_Tool_0.9.18.2
3-Flash_Tool_0.9.22.3 (i know using flashtool > 0.9.18.6 will brick the device but it is the only version that shows information )
4-Flash_Tool_0.9.24.4
5-Flash_Tool_0.9.33.3
in all am facing the same problem. It's either: "Processing of loader.sin finished with errors" or "unable to read from the phone after having opened it" and the process stuck at opening the phone for reading (note: after 30+ min the process will continue to loader with error) .
i have tried Xperia companion but it shows that "the device is locked and you must unlock its message", Emma tool recognise the device as unknown .
any idea how to solve the problem?
am stuck with bootlooping device.
Code:
08/004/2022 09:04:39 - DEBUG - Current build : Version 0.9.24.4 built on 01-02-2018 22:15:00
08/004/2022 09:04:45 - INFO - Flash canceled
08/004/2022 09:04:55 - DEBUG - Creating bundle from ftf file : E:\Mobile Software\Firmware\Sony\firmwares\C5 Ultra\E5533_29.2.B.0.174_1296-8542_R3B.ftf
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : loader.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : auto-boot.ta
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : boot.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : boot_delivery.xml
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : cache.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : cust-reset.ta
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : elabel.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : fotakernel.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : oem.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : osv-restriction.ta
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : partitions.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : system.sin
08/004/2022 09:04:55 - DEBUG - Added this entry to the bundle list : userdata.sin
08/005/2022 09:05:34 - INFO - Selected Bundle for Sony Xperia C5 Ultra(E5533). FW release : 29.2.B.0.174. Customization : Customized MEA
08/005/2022 09:05:34 - INFO - Preparing files for flashing
08/005/2022 09:05:34 - DEBUG - Created the prepared folder
08/005/2022 09:05:34 - DEBUG - Saving entry boot.sin to disk
08/005/2022 09:05:34 - DEBUG - Streaming from jar entry : boot.sin
08/005/2022 09:05:34 - DEBUG - Writing Entry to E:\Mobile Software\Firmware\Sony\firmwares\prepared\boot.sin
08/005/2022 09:05:34 - DEBUG - Saving entry elabel.sin to disk
08/005/2022 09:05:34 - DEBUG - Streaming from jar entry : elabel.sin
08/005/2022 09:05:34 - DEBUG - Writing Entry to E:\Mobile Software\Firmware\Sony\firmwares\prepared\elabel.sin
08/005/2022 09:05:34 - DEBUG - Saving entry partitions.sin to disk
08/005/2022 09:05:34 - DEBUG - Streaming from jar entry : partitions.sin
08/005/2022 09:05:34 - DEBUG - Writing Entry to E:\Mobile Software\Firmware\Sony\firmwares\prepared\partitions.sin
08/005/2022 09:05:34 - DEBUG - Saving entry system.sin to disk
08/005/2022 09:05:34 - DEBUG - Streaming from jar entry : system.sin
08/005/2022 09:05:34 - DEBUG - Writing Entry to E:\Mobile Software\Firmware\Sony\firmwares\prepared\system.sin
08/006/2022 09:06:48 - DEBUG - Saving entry loader.sin to disk
08/006/2022 09:06:48 - DEBUG - Streaming from jar entry : loader.sin
08/006/2022 09:06:48 - DEBUG - Writing Entry to E:\Mobile Software\Firmware\Sony\firmwares\prepared\loader.sin
08/006/2022 09:06:48 - INFO - Please connect your device into flashmode.
08/007/2022 09:07:14 - INFO - Using Gordon gate drivers version 3.1.0.0
08/007/2022 09:07:14 - INFO - Opening device for R/W
08/007/2022 09:07:14 - INFO - Device ready for R/W.
08/007/2022 09:07:14 - INFO - Reading device information
08/007/2022 09:07:14 - DEBUG - PROT_VER="04";VER="";S1SBL_VER="MT67x2_20";ID="";TYPE="S1_BOOT";ACTIVE_COMP_AID="0004";MAX_PKT_SZ="00080000";IGNORE_CRC="HDR,DATA";DEF_SEC="ON";HWCONF_AID="0004";LOADER_AID="0004";BOOT_AID="0004";NO_SUB_SYSTEMS="0001";OTP_DATA_1="0400";OTP_LOCK_STATUS_1="LOCKED";UNIQUE_DEV_ID_1="EDDAD192332BF4F6";IDCODE_1="52670000008A0000";SUID_1="09000000526700008A429AFA9D5D8C8F";S1_ROOT="S1_Root_4154,S1_Root_Test_b316";MSN="UNKNOWN";HW_CONFIG_VER="0006";HW_CONFIG_INFO="HWC_Chambal_Com_007";SEC_STATE="HWC_Chambal_Com_007";IMEI="35419507441362";PROD_ID="0001";GLOB_SEC="0000";PHONE_ID="0000:35419507441362,0000:35419507441363";HW_CONFIG="S1_Boot:0004:0013,S1_Loader:0004:000B,S1_SW:0005:0013,S1_Cust:0004:0013,S1_ELabel:0004:0013,S1_SL:0004:0043,S1_FOTA:0005:0023,S1_RLock:0004:0223";ROOTING_STATUS="ROOTABLE";PLF_ROOT_1="420DCA0987CD7363D4D5625FABDBCA68F4EDE6AAFFD3CB2869F483C725C6A549";REMOTE_LOCK="UNLOCKED";
08/007/2022 09:07:14 - DEBUG - First command reply (hook) :
08/007/2022 09:07:14 - INFO - Phone ready for flashmode operations.
08/007/2022 09:07:14 - INFO - Opening TA partition 2
08/007/2022 09:07:17 - INFO - Device disconnected
08/007/2022 09:07:18 - INFO - Device connected in flash mode
Not even any help?
Note: I own easyjtag+, but am not that sure if it will help.
hi, i have same problem, i can't flash anything mine is c5 e5533, i can use fastboot with few commands, the phone don't enter in recovery menu, i try everything... even use BLU on flashtool and try to unlock the bootloader, i check all web for use the sp flash tools but without any clear instruction i don't know if we can use this tool for our sony and how? please some help