Email Forensics

Forensic PST Analysis Tool

Court-admissible PST email analysis with SHA256 integrity verification and automated chain of custody reporting. Built by examiners who testify.

Sherlock PST Viewer is a forensic PST analysis tool that opens PST and OST email archives in read-only mode with SHA256 hash verification per message. It generates chain of custody reports for court proceedings. Free edition available. Pro edition is $67 USD with batch export and advanced forensic features. Built by CISSP, ISSAP, ISSMP certified examiners in Vancouver with 20+ years of court testimony experience.

New Feature

Court-Ready PDF Reports for $67

Sherlock PST Viewer Pro generates court-ready PDF forensic reports with per-message SHA-256 hashing, sender IP attribution from RFC-822 Received headers and chain of custody documentation. Mark relevant emails and generate a multi-page report suitable for court filing. One-time purchase at $67 USD.

Our $67 tool produces the same quality forensic reports that firms charge $5,000 in billable hours to create manually.

Forensic email reports have traditionally required an examiner to manually document sender attribution, hash each message, record authentication results and compile everything into a presentable format. That process takes hours per case. Sherlock PST Viewer Pro automates the entire workflow.

Mark and Report Workflow

Browse or search the PST archive. Mark relevant emails using per-message checkboxes. Click Generate Report. The tool produces a multi-page PDF automatically.

What the PDF Report Contains

Title page
Documents the tool version, license holder, session ID, generation timestamp and source file SHA-256 hash. This establishes the provenance of the report.
Per-email evidence cards
Each marked email gets a full evidence card with sender attribution including name, email address, source IP and hostname extracted from RFC-822 Received headers. Authentication-Results (SPF/DKIM/DMARC) are documented per message. The Message-ID and per-message SHA-256 hash are included for independent verification.
Recipients table
Each evidence card includes a recipients table documenting To, Cc and Bcc fields with display names resolved where available.
Body content
Email body content is included with HTML converted to readable text. Formatting artifacts are stripped while preserving the substantive content.

Forensic Integrity by Design

Marks are stored separately from the evidence file. The source PST is never modified during analysis or report generation. This read-only approach preserves the original evidence and allows any qualified examiner to independently verify the results.

Marks persist by source file SHA-256 hash. Close the application and reopen it days later with the same PST file and your marks are still there. Marks survive restarts because they are tied to the cryptographic identity of the source file, not a file path or session.

Download Free Buy Pro - $67

The Problem

Why Forensic Soundness Matters for PST Analysis

Every email investigation begins with a PST file. Microsoft Outlook stores years of correspondence, attachments, calendar entries and contact records inside a single Personal Storage Table file. In litigation, regulatory investigations and internal fraud cases, PST files are frequently the primary source of documentary evidence.

The problem is that most PST viewers were designed for IT administrators, not forensic examiners. They open files in read-write mode. They modify last-accessed timestamps. They provide no hash verification. They generate no chain of custody documentation. When opposing counsel challenges the integrity of your email evidence, a consumer-grade PST viewer gives you nothing to stand on.

Forensic soundness is not a feature. It is the baseline requirement. Without it, every email you present in court is vulnerable to a spoliation argument. The examiner must demonstrate that the evidence was collected, preserved and analyzed without modification. That demonstration requires verifiable hashing, documented procedures and a tool designed for the courtroom rather than the help desk.

The Cost of Getting It Wrong

In 2024, a BC Supreme Court proceeding excluded email evidence because the examiner could not demonstrate that the PST file had not been modified during analysis. The opposing expert identified timestamp changes consistent with read-write access. The emails were excluded under the best evidence rule and the case outcome shifted.

This scenario repeats across Canadian provincial courts and US federal proceedings. Judges are increasingly sophisticated about digital evidence integrity. The Federal Rules of Civil Procedure (FRCP) Rule 37(e) permits adverse inference instructions when electronically stored information is lost or altered due to failure to take reasonable preservation steps. Canadian courts apply similar principles under the Sedona Canada Principles Addressing Electronic Discovery.

A forensically sound PST viewer eliminates this risk at the point of analysis. Write-blocking ensures the file cannot be modified. Per-message hashing proves individual email integrity. Chain of custody documentation records every examiner action from file receipt through report delivery.

How Sherlock PST Viewer Maintains Forensic Integrity

Sherlock PST Viewer was built by forensic examiners who testify in court. Every design decision prioritizes evidentiary integrity over convenience.

Read-Only Access

Sherlock PST Viewer opens PST and OST files in strict read-only mode. The tool never writes to the source file. No timestamps are modified. No metadata is altered. The original file remains byte-for-byte identical before and after analysis. This is verifiable by comparing SHA256 hashes of the file pre- and post-examination.

SHA256 Per-Message Hashing

The Pro edition computes a SHA256 hash for every individual email message during analysis. This creates a cryptographic fingerprint for each piece of evidence. If opposing counsel questions whether a specific email was altered, the examiner can present the hash value computed at the time of analysis and demonstrate it matches the hash of the email in the original PST file.

Per-message hashing goes beyond whole-file hashing. A single PST file may contain 50,000 messages. Whole-file hashing proves the container was not modified. Per-message hashing proves each individual message was not modified. This granular verification is what courts expect from qualified forensic examiners.

Automated Chain of Custody Reports

The Pro edition generates a chain of custody report that documents the examiner name, examination date, source file path, source file SHA256 hash, every search query executed, every filter applied, every message exported and the SHA256 hash of each exported item. This report is generated automatically from the tool's internal audit log. No manual note-taking required. No gaps in documentation.

Batch Export with Integrity Verification

When exporting messages for production, the Pro edition exports in EML format with SHA256 hashes recorded for every exported file. The export manifest includes message metadata (sender, recipient, date, subject) alongside the hash value. This manifest becomes a verifiable index of produced evidence that can be independently validated.

What Makes Sherlock Different from Competitors

Built by forensic examiners, not software developers
Sherlock PST Viewer was designed by CISSP, ISSAP, ISSMP certified practitioners with over 20 years of courtroom experience. The feature set reflects what examiners actually need when testifying, not what a product manager guessed they might want.
Priced for practitioners
The Free edition handles basic PST viewing with full-text search. The Pro edition at $67 USD includes every forensic feature. Competing forensic PST tools from SysTools cost $299. FTK requires a full license. Sherlock delivers forensic-grade output at a fraction of the cost.
No subscription. No annual renewal.
One payment. Permanent license. Free updates for the current major version. No vendor lock-in. No recurring charges that inflate case costs.
Expert witness support included
If you need expert testimony to support findings generated by Sherlock PST Viewer, the same team that built the tool provides expert witness services. Your expert understands the tool at the code level because they wrote it.

Forensic PST Analysis Workflow

The following workflow represents the standard operating procedure used by Sherlock Forensics examiners when analyzing PST files for litigation or investigation purposes.

StepActionToolOutput
1Document source and custodianCase managementIntake form with custodian details
2Create forensic image of storage mediaFTK Imager / ddBit-for-bit image with hash verification
3Extract PST file from imageFTK Imager / AutopsyPST file with documented extraction path
4Hash the extracted PSTSherlock HashSHA256 hash of source PST
5Create working copyFile system copyWorking copy with matching SHA256
6Open in Sherlock PST ViewerSherlock PST Viewer ProRead-only access confirmed
7Search, filter and reviewSherlock PST Viewer ProRelevant messages identified
8Export with hashingSherlock PST Viewer ProEML files with SHA256 manifest
9Generate chain of custody reportSherlock PST Viewer ProComplete examination record
10Verify source PST unchangedSherlock HashSHA256 match confirmed

Case Study: Corporate Fraud Investigation

A Vancouver-based financial services firm retained Sherlock Forensics to investigate suspected embezzlement by a senior manager. The investigation centered on email communications between the subject and external co-conspirators.

Collection

IT provided a forensic image of the subject's workstation. The Outlook PST file was 12.4 GB containing approximately 87,000 messages spanning four years. A second OST file contained an additional 23,000 messages from the subject's Exchange cache.

Analysis

Using Sherlock PST Viewer Pro, the examiner searched both archives for keywords related to wire transfers, account numbers and vendor names identified by the client. Date range filtering narrowed the review to a 14-month window. The tool identified 342 responsive messages across both archives.

Production

All 342 messages were exported in EML format with individual SHA256 hashes. The chain of custody report documented every search query, filter and export action. The source PST and OST files were re-hashed after analysis and matched their original values, confirming no modification occurred.

Outcome

The email evidence was admitted without challenge. The chain of custody documentation preempted any spoliation argument. The examiner testified as to the methodology and the subject settled before trial. Total tool cost: $67.

Supported File Formats and Capabilities

FeatureFree EditionPro Edition ($67)
Open PST filesYesYes
Open OST filesYesYes
Full-text searchYesYes
Individual email exportYesYes
SHA256 per-message hashingNoYes
Batch exportNoYes
Chain of custody reportNoYes
Advanced date/keyword filtersNoYes
Attachment extractionNoYes
Corrupted PST recoveryNoYes
Priority supportNoYes

Legal Standards and Compliance

Forensic PST analysis must satisfy the evidentiary standards of the jurisdiction where the evidence will be presented. Sherlock PST Viewer Pro was designed to meet or exceed the following frameworks.

Federal Rules of Evidence (US) - Rule 901(b)(9)
Requires authentication of evidence produced by a process or system. SHA256 hashing and chain of custody documentation satisfy this requirement by demonstrating the integrity of the analytical process.
Federal Rules of Civil Procedure (US) - Rule 37(e)
Addresses spoliation of electronically stored information. Read-only access and pre/post analysis hash verification demonstrate that no spoliation occurred during examination.
Canada Evidence Act - Section 31.2
Addresses the authentication of electronic documents. The chain of custody report generated by Sherlock PST Viewer Pro provides the documentation needed to satisfy authentication requirements.
Sedona Canada Principles
Provides guidance on proportionality, preservation and production of electronic evidence. Sherlock PST Viewer Pro's targeted search and export capabilities support proportional production.

External Resources

For additional guidance on forensic email analysis and electronic evidence handling:

Questions

Forensic PST Analysis FAQ

What makes PST analysis forensically sound?
Forensically sound PST analysis requires write-blocking to prevent modification, SHA256 hash verification before and after analysis, documented chain of custody for every action and read-only access to the original file. Sherlock PST Viewer Pro implements all of these controls automatically.
Can Sherlock PST Viewer open corrupted PST files?
Yes. The tool includes a recovery engine that can parse partially corrupted PST files and extract readable messages, attachments and metadata. Recovered items are flagged separately for documentation purposes.
Is PST Viewer output admissible in court?
Sherlock PST Viewer produces output with SHA256 hash verification and chain of custody documentation that meets Canadian and US evidentiary standards. Admissibility depends on jurisdiction and proper handling by the examiner.
What is the difference between Free and Pro?
Free opens PST/OST files with search and individual export. Pro ($67) adds SHA256 per-message hashing, batch export, chain of custody reports, advanced filters, attachment extraction and priority support.
Does it work with OST files?
Yes. Sherlock PST Viewer opens both PST and OST files. OST files are the offline cache of Exchange mailboxes. The forensic workflow is identical for both file types.
Are Sherlock PST Viewer PDF reports admissible in court?
Sherlock PST Viewer Pro generates PDF reports with SHA-256 hashing per message, sender IP attribution from RFC-822 Received headers, SPF/DKIM/DMARC authentication results and chain of custody documentation. The tool operates in read-only mode and marks are stored separately from the evidence file. Reports are built by CISSP, ISSAP, ISSMP certified examiners with 20 years of courtroom experience. Admissibility depends on jurisdiction and proper evidence handling.
Can I use the PDF reports in civil litigation?
The reports document SHA-256 per-message hashes, sender IP attribution, authentication results, chain of custody and examiner identification. These are the elements courts typically require when evaluating digital evidence. Admissibility varies by jurisdiction, but the report format is designed to satisfy the evidentiary standards of Canadian and US courts.

Get Started

Download Sherlock PST Viewer

Free edition for basic PST viewing. Pro edition ($67) for forensic-grade analysis with SHA256 hashing and chain of custody reporting. No subscription. No annual renewal.

Since 20064.8/5 ratingCISSP, ISSAP, ISSMP certified
Download Free Buy Pro - $67 Call 604.229.1994