Skip to main content
Skip table of contents

Physical Extraction - Spreadtrum

This method provides the possibility to create a physical dump of internal memory from devices with a Spreadtrum chipset without knowing the passcode or pattern lock.

SPD Bootloader mode is used for data extraction.

Spreadtrum chipsets are manufactured by UNISOC.

SPD Bootloader mode is a special mode supported by devices with Spreadtrum chipset. The device can be put in SPD bootloader mode by key combinations or via test points.

In some cases, the physical dump may be encrypted.

HOW TO

  1. On the main screen, select “Security bypassing”.

  2. Choose a security bypassing approach.

By model

Select the exact device model from the list and choose “Get physical dump from Spreadtrum”. Follow the on-screen instructions. If the device is not listed, try another approach

 

By chipset

If the chipset is known, select it from the list. Then follow the on-screen instructions.

In case the method has multiple variants, try one at a time. On the left side is a list of devices for a given variant, we first recommend choosing variants for similar types of phones.

 

Generic profile

Use this option if By model or By chipset have not been successful. Follow the on-screen instructions.

For this approach, you will need to search the internet for the device FW and create a PAC file which can then be loaded into MOBILedit Forensic.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.