This method provides the possibility to create a physical dump of internal memory from devices with a Spreadtrum chipset without knowing the passcode or pattern lock.
SPD Bootloader mode is used for data extraction.
Spreadtrum chipsets are manufactured by UNISOC.
SPD Bootloader mode is a special mode supported by devices with Spreadtrum chipset. The device can be put in SPD bootloader mode by key combinations or via test points.
In some cases, the physical dump may be encrypted.
On the main screen, select “Security bypassing”.
Choose a security bypassing approach.
Select the exact device model from the list and choose “Get physical dump from Spreadtrum”. Follow the on-screen instructions. If the device is not listed, try another approach
If the chipset is known, select it from the list. Then follow the on-screen instructions.
In case the method has multiple variants, try one at a time. On the left side is a list of devices for a given variant, we first recommend choosing variants for similar types of phones.
Use this option if By model or By chipset have not been successful. Follow the on-screen instructions.
For this approach, you will need to search the internet for the device FW and create a PAC file which can then be loaded into MOBILedit Forensic.