{"id":210,"date":"2015-11-26T12:35:59","date_gmt":"2015-11-26T12:35:59","guid":{"rendered":"https:\/\/www.acquireforensics.com\/blog\/?p=210"},"modified":"2025-05-27T10:38:16","modified_gmt":"2025-05-27T10:38:16","slug":"recover-deleted-data-from-pst-file","status":"publish","type":"post","link":"https:\/\/www.acquireforensics.com\/blog\/recover-deleted-data-from-pst-file.html","title":{"rendered":"A Prominent PST Probe Tool To Recover Deleted Data From PST File!"},"content":{"rendered":"<p>Investigators usually cease hard disks for investigations where they can find several files of different formats for examinations. As emails are considered a foolproof source of evidence defining portrayal of suspect\u2019s activities, email files are prime files for examination. This can help investigators to outline the activities of the suspect reaching to a conclusion or motive of the criminal case. Outlook email application developed by Microsoft is the most commercial and worldwide adapted desktop email client. Investigators many times come across Outlook PST investigation to recover deleted data from PST file, especially during corporate forgery cases. Emails are major carriers of virus infection and hence can be used for spreading malware through network.<\/p>\n<h2><strong>Why Is Data Mining of Deleted Email Data Necessary?<\/strong><\/h2>\n<p>Email analysis can be difficult, especially the deleted data items from Outlook data file. There is high probability that suspect has tried to manipulate the email data and might have even tried to eradicate important emails which have traces of crime. In many other cases, deleted items like emails or contacts can hold some clue for the case, which in normal investigation will not be disclosed. Hence, while performing Outlook email application scrutiny it is important to recover data from corrupt PST file. This recovered email data can help for examination.<\/p>\n<h2><strong>How Can Hex Editor Help At Some Extent?<\/strong><\/h2>\n<p><strong>Hex Editor<\/strong> can be an ultimate solution for recovering the lost email data. It is highly recommended to perform this recovery procedure on PST copy instead of original PST files.<\/p>\n<ul>\n<li>Open PST file in Hex Editor.<\/li>\n<li>Delete positions 7 through 13, which will clear the 13 characters in positions: 00007, 00008, 00009, 0000a, 0000b, 0000c, 0000d<br \/>\n0000e, 0000f, 00010, 00011, 00012, 00013.<\/li>\n<li>Once the characters are cleared, editor will display \u201c20\u201d code in their position.<\/li>\n<li>Save this edited PST file, which has been corrupted due to editing done using Hex Editor.<\/li>\n<li>Now, execute <strong>Inbox Repair Tool (ScanPST.exe)<\/strong> on the file to recover data from the file to another PST file.<\/li>\n<li>This ScanPST.exe utility will create a backup and will repair damaged PST file recreating the damaged file.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2015\/11\/scanpst.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-213\" src=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2015\/11\/scanpst.png\" alt=\"Recover Deleted Data From PST File\" width=\"448\" height=\"301\" \/><\/a><\/p>\n<p>This recovered PST file will comprise of the deleted items of PST files as well as it repairs the corrupted items and deleted items. However, there are high chances that the file is severely corrupted and even the data, which was earlier accessible, is not viewed. In such situations, users can try better investigative solution like PST data Viewer to preview and recover data from corrupt PST file.<\/p>\n<h3><strong>How To Recover Deleted Data From PST File?<\/strong><\/h3>\n<p>The software is a freeware application, which provides a platform to perform analysis on the Outlook data file. It also helps to explore the deleted items from Outlook data file for performing examination on it. Let us see how it can be done;<\/p>\n<p><a href=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2015\/11\/tool.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-214\" src=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2015\/11\/tool.png\" alt=\"Recover Data From Corrupt PST File\" width=\"640\" height=\"400\" \/><\/a><\/p>\n<p><a id=\"pst-viwer-download\" href=\"https:\/\/www.acquireforensics.com\/download\/SYS1P7S9T\/544\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-42 size-full\" src=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2015\/09\/download.png\" alt=\"download\" width=\"236\" height=\"54\" \/><\/a><\/p>\n<ul>\n<li>Install the software in your Windows system to recover deleted data from PST file and then click on <strong>Add File<\/strong>.<\/li>\n<li>This will pop up another window where you can navigate to the PST file location. Click on <strong>Select File<\/strong> and provide the path location of the PST file.<\/li>\n<li>Since deleted items have to be recovered, check the <strong>Advance Scan<\/strong> option and then click on Add File.<\/li>\n<li>This will scan the PST file thoroughly displaying recovered deleted items along with other items as well.<\/li>\n<li>All the emails can be read along with the technical properties like <em>Subject, To, Sent, Size,<\/em><\/li>\n<li>Individual emails can also be viewed along with attachments without any complications.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2015\/11\/recovered-data.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215\" src=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2015\/11\/recovered-data.png\" alt=\"Recover Data From Corrupt PST File\" width=\"640\" height=\"400\" \/><\/a><\/p>\n<p>Deleted data of any desktop email client can be a crucial segment to search for evidence. However, recovery of deleted data can be done through very advance technologies embedded in technical utilities. <strong><a href=\"http:\/\/www.acquireforensics.com\/products\/free\/pst-viewer\/\" target=\"_blank\" rel=\"noopener\">PST Viewer is a convenient investigation utility<\/a><\/strong>, which endures recovery of permanently deleted data from different types of PST files: ANSI and Unicode. Its prevalent technique is unique to provide the details in readable form for performing analysis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigators usually cease hard disks for investigations where they can find several files of different formats for examinations. As emails are considered a foolproof source of evidence defining portrayal of suspect\u2019s activities, email files are prime files for examination. This can help investigators to outline the activities of the suspect reaching to a conclusion or [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":216,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-file-format"],"_links":{"self":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":1,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"predecessor-version":[{"id":600,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts\/210\/revisions\/600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/media\/216"}],"wp:attachment":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}