Admin
Desconectado
- Marca 📱
- Samsung
- Modelo 🔖
- Samsung Galaxy A14 5G SM-A146U
- 📱 Android / Sistema operativo
- Android 15
- Tipo de falla / servicio 🛠️
- FRP / Desbloqueos (cuentas, IMEI, red)
- 🔧Herramienta utilizada
- pandora | Pandora Box
- Estado del equipo 📋
- Bloqueado (Contraseña o cuenta Google) FRP O Hart Reset
- ¿Problema resuelto?
- si | ✅ Resuelto
Remover Cuenta Google FRP A Samsung Galaxy A14 5G SM-A146U Android 15 Binario 16 Bin 16 Seguridad parche Enero 2026 con pandora
Guía técnica especializada para remover la cuenta Google (FRP) en el Samsung Galaxy A14 5G (SM-A146U). Este método está actualizado para dispositivos con Android 15, Binario 16 y el parche de seguridad de enero 2026, utilizando la herramienta Pandora Box/Tool de manera efectiva y segura.
Toco Pandora box
Selecionar el modelo dar en reser frp y limpiar conetar apagado presionando teclas de volumen ambas el telefono te pedira Reset entrara a modo recovery has hart reset y de hay subira sin cuenta
Guía técnica especializada para remover la cuenta Google (FRP) en el Samsung Galaxy A14 5G (SM-A146U). Este método está actualizado para dispositivos con Android 15, Binario 16 y el parche de seguridad de enero 2026, utilizando la herramienta Pandora Box/Tool de manera efectiva y segura.
Toco Pandora box
Selecionar el modelo dar en reser frp y limpiar conetar apagado presionando teclas de volumen ambas el telefono te pedira Reset entrara a modo recovery has hart reset y de hay subira sin cuenta
Debes estar registrado para ver imágenes adjuntar
Código:
Selected model: Samsung SM-A146U (Samsung Galaxy A14 5G)
Operation: Erase FRP And Wipe
Software version: 9.25
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1504.0]
Device found at COM14 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0989
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM15 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF7EDDAAE, 0x95548E63, 0x1F8FAD4D, 0xF8EB38E7
Get Chip ID... [MT6833]
Get SOC ID... [8BE53C27F68F98B604577DF34C08FC3569B87CC0FED8F57DA1DAEDA3A1B2F5D7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM5P9001DM-B424 (0002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM5P9001DM-B424
UFS_FWVER : 0002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x0EE5800000 (59.59Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 20% - 30% device life time used
DeviceLifeTimeEstB: 20% - 30% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... error
Read product info... [EROFS] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A146U
Product Name : a14xmsq
Product Device : a14xm
Build ID : AP3A.240905.015.A2
Build Date : Tue Jan 13 16:31:13 KST 2026
Firmware Version : A146USQSGEZA1
Read partition "frp"... OK
Read partition "persistent"... OK
Backup saved to C:/Program%20Files%20(x86)/Pandora/Backup/MTK/Samsung_SM-A146U%20(Samsung%20Galaxy%20A14%205G)/FRP_BACKUP_(2026-4-18_14-58-55)/
Format FRP... [P1] [P2] OK
Writting FRP data... OK
Formatting "userdata" partition... [P1] OK
Formatting "cache" partition... [P1] OK
Formatting "metadata" partition... [P1] OK
Wipe data done!
Archivos adjuntos
Debes estar registrado para ver la lista de archivos adjuntos.
Última edición: