{"id":417,"date":"2022-11-04T17:08:00","date_gmt":"2022-11-04T11:38:00","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=417"},"modified":"2025-11-07T17:19:03","modified_gmt":"2025-11-07T11:49:03","slug":"initiate-incredimail-mailbox-forensics","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/","title":{"rendered":"Smartest Way to Perform IncrediMail Mailbox Forensics"},"content":{"rendered":"<p style=\"text-align: justify;\">Are you about to investigate IncrediMail emails &amp; looking for IncrediMail mailbox forensics? Undergoing cumbersome time to find the appropriate solution for the same? Do not worry! Read the complete blog and get the analysis of your emails from IncrediMail in no time!<\/p>\n<p style=\"text-align: justify;\">IncrediMail is a desktop-based email client, which is no longer in service from March 20, 2020. As a result, users are not able to access their IncrediMail data after the mentioned date. However, there comes an instance wherein investigating officers may get IMM files of IncrediMail from the crime scene. Now, this can be a piece of solid evidence for investigation purposes. However, the challenging question is how is it possible to access and examine data from IMM files. The answer to this mind-scratching question is there in the upcoming section of the blog.<\/p>\n<p style=\"text-align: justify;\"><em>So folks, read on the blog till the end to instantly perform IncrediMail mailbox forensics!<\/em><\/p>\n<h2 class=\"h4\">How IncrediMail Saves Email Data?<\/h2>\n<p style=\"text-align: justify;\">IncrediMail stores email messages in the IMM file format. To be precise, it saves raw emails and not the attachments. The index information of the IMM files gets saved into the IMH file i.e., the header file which includes details about the sender, receiver, etc. There is an attachment directory which consists of all the email attachments such as pictures, documents, etc.<\/p>\n<p style=\"text-align: justify;\">The default database file of IncrediMail is being stored in <strong>\u201cC:\\Users\\%username%\\Appdata\\Local\\IM\\Identities\u201d<\/strong> folder. The emails of every folder get saved under <strong>\u201cIdentities\\{longstring}\\Message Store\u201d<\/strong> folder. In this, <strong>messagestore.db<\/strong> file will be available that stores the application metadata (messages) with the relational data model. IncrediMail uses SQLite3 in order to save and manage the database.<\/p>\n<p style=\"text-align: justify;\">Upon checking the SQLite database, we can observe that other than <strong>messagestore.db<\/strong> file, there are other directories, which the system creates. While these folders store the actual data, the .db file saves pointers to the data folders for quick access.<\/p>\n<h2 class=\"h4\">IncrediMail Mailbox Forensics &#8211; View Email Header<\/h2>\n<p style=\"text-align: justify;\">In order to view the header of the IncrediMail email, simply follow the steps mentioned below.<\/p>\n<ul>\n<li style=\"text-align: justify;\">Launch IncrediMail in your system, then right-click the email message and select <strong>Properties<\/strong> option.<\/li>\n<li style=\"text-align: justify;\">In the upcoming screen, go to the <strong>Details<\/strong> tab to view the email header for the chosen email message.<\/li>\n<li style=\"text-align: justify;\">Under this tab, one can view the different attributes of the header such as <strong>Subject, From, To, MIME-Version, X-Priority<\/strong>, etc.<\/li>\n<\/ul>\n<h3 class=\"h4\">100% Proven Method to Conduct IncrediMail Mailbox Forensics<\/h3>\n<p style=\"text-align: justify;\">It is quite challenging to install and examine the proprietary email application to examine the email files. In the case of IncrediMail, forensic experts have to install the email client first to view the data from the IMM files. However, due to time constraints and various other concerning factors, it is best suggested to use the <strong><a href=\"https:\/\/www.mailxaminer.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">MailXaminer<\/a><\/strong> software.<\/p>\n<p style=\"text-align: justify;\">It is an authentic and reliable <a href=\"https:\/\/www.mailxaminer.com\/product\/\" target=\"_blank\" rel=\"noopener\"><strong>Email Forensics Tool<\/strong><\/a> that provides deep insight for the suspected email messages. The software is designed to support 20+ email clients, including the IncrediMail IMM file. It is loaded with countless advanced features that makes the tool proficient in comparison to other emails forensic software.<\/p>\n<h3 class=\"h4\">How to Perform IncrediMail Mailbox Forensics Using Top-Notch Software<\/h3>\n<p style=\"text-align: justify;\">The following steps help the investigator to precisely examine the IMM files with the help of a high quality email investigation software.<\/p>\n<p style=\"text-align: justify;\"><em>So, let\u2019s understand &amp; begin the step-by-step process!<\/em><\/p>\n<p style=\"text-align: justify;\"><strong>Step-1.<\/strong>\u00a0Click on <strong>Add New Evidence<\/strong> to upload the email data file in which a dialog box will appear to create the case. After the creation of the case, select the IMM file from <strong>Add Evidence<\/strong>. <strong>Browse<\/strong> the file from the folder and click <strong>Add<\/strong> to proceed further.<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6756\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2022\/11\/incredimail.png\" alt=\"incredimail forensics\" width=\"1920\" height=\"1210\" \/><strong>Step-2.<\/strong> After uploading the file on the software to perform IncrediMail mailbox forensics, the software will scan the file which might take some time based on the file size.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5296\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2022\/11\/imm2.png\" alt=\"\" width=\"1366\" height=\"726\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Step-3.<\/strong> In the <strong>Search<\/strong> tab, the software will provide a preview of all the files and folders as shown in the below image.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5297\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2022\/11\/imm3.png\" alt=\"\" width=\"1366\" height=\"726\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Step-4.<\/strong> In order to examine the emails diligently, simply select the suspected email message and a new wizard pops up. With this, one can make use of 7+ preview modes such as <strong>Mail, HEX, Properties, Message Header<\/strong>, etc. Each view option provides a broader picture showcasing the different attributes of the email message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5298\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2022\/11\/imm4.png\" alt=\"\" width=\"1366\" height=\"724\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Step-5.<\/strong> After performing Incredimail mailbox forensics the investigator can export the emails into different file formats. Simply, <strong>right-click<\/strong> the email and choose the <strong>Export<\/strong> option.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5299\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2022\/11\/imm5.png\" alt=\"\" width=\"1366\" height=\"722\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Step-6.<\/strong> From the <strong>Export Options<\/strong> window, investigators can avail the desired export file format such as <strong>EML, HTML, PDF, MSG<\/strong>, etc. as per their requirement.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5300\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2022\/11\/imm6.png\" alt=\"\" width=\"1366\" height=\"724\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><em>That\u2019s it! <\/em><em>Isn\u2019t the software worthwhile to analyze IncrediMail files?<\/em><\/p>\n<h3 class=\"h4\">The End Note<\/h3>\n<p style=\"text-align: justify;\">In order to perform IncrediMail mailbox forensics, users need to examine IMM files, which is the default file format of IncrediMail. Hence, the investigating officers make use of reliable and proven professional utility\u00a0to examine the IncrediMail emails in a hassle-free way.<\/p>\n<p style=\"text-align: justify;\">This is because it is not feasible every time to install the default email application to analyze the gathered email data file from the cybercrime location. Using this remarkable email forensic software, there is no worry of examining email files. As it is capable enough to analyze 20+ email files, including the IncrediMail IMM file without the need for installing any external application.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you about to investigate IncrediMail emails &amp; looking for IncrediMail mailbox forensics? Undergoing cumbersome time to find the appropriate <a href=\"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":9,"featured_media":5172,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Incredimail Forensics \u2013 View &amp; Analyze IncrediMail IMM Files<\/title>\n<meta name=\"description\" content=\"Initiate with Incredimail Forensics to view &amp; analyze .imm files. Carve evidence from .imm files by reading Incredimail emails forensically.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incredimail Forensics \u2013 View &amp; Analyze IncrediMail IMM Files\" \/>\n<meta property=\"og:description\" content=\"Initiate with Incredimail Forensics to view &amp; analyze .imm files. Carve evidence from .imm files by reading Incredimail emails forensically.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-04T11:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T11:49:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/07\/incredimail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"390\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tej Pratap Shukla\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tej Pratap Shukla\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/\"},\"author\":{\"name\":\"Tej Pratap Shukla\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/ff3afbe1ac8838fe3a5246ab51b37a8c\"},\"headline\":\"Smartest Way to Perform IncrediMail Mailbox Forensics\",\"datePublished\":\"2022-11-04T11:38:00+00:00\",\"dateModified\":\"2025-11-07T11:49:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/\"},\"wordCount\":884,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/incredimail.png\",\"keywords\":[\"IncrediMail Mailbox Forensics\"],\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/\",\"name\":\"Incredimail Forensics \u2013 View & Analyze IncrediMail IMM Files\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/incredimail.png\",\"datePublished\":\"2022-11-04T11:38:00+00:00\",\"dateModified\":\"2025-11-07T11:49:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/ff3afbe1ac8838fe3a5246ab51b37a8c\"},\"description\":\"Initiate with Incredimail Forensics to view & analyze .imm files. Carve evidence from .imm files by reading Incredimail emails forensically.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/incredimail.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/incredimail.png\",\"width\":696,\"height\":390,\"caption\":\"IncrediMail mailbox forensics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/initiate-incredimail-mailbox-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Smartest Way to Perform IncrediMail Mailbox Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/ff3afbe1ac8838fe3a5246ab51b37a8c\",\"name\":\"Tej Pratap Shukla\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/477bdfb87b4a0b6b287b8e9aa10b59e78eb55a1f2f34d4caaa36e2f3754584cc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/477bdfb87b4a0b6b287b8e9aa10b59e78eb55a1f2f34d4caaa36e2f3754584cc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/477bdfb87b4a0b6b287b8e9aa10b59e78eb55a1f2f34d4caaa36e2f3754584cc?s=96&d=mm&r=g\",\"caption\":\"Tej Pratap Shukla\"},\"description\":\"A versatile technocrat, always in the search for new and interesting areas related to technology. Works on multiple technical problems faced by users frequently. Provides the user-friendly solutions to deal with numerous technical issues.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/tej-pratap-shukla\\\/\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/tej\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incredimail Forensics \u2013 View & Analyze IncrediMail IMM Files","description":"Initiate with Incredimail Forensics to view & analyze .imm files. Carve evidence from .imm files by reading Incredimail emails forensically.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/","og_locale":"en_US","og_type":"article","og_title":"Incredimail Forensics \u2013 View & Analyze IncrediMail IMM Files","og_description":"Initiate with Incredimail Forensics to view & analyze .imm files. Carve evidence from .imm files by reading Incredimail emails forensically.","og_url":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2022-11-04T11:38:00+00:00","article_modified_time":"2025-11-07T11:49:03+00:00","og_image":[{"width":696,"height":390,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/07\/incredimail.png","type":"image\/png"}],"author":"Tej Pratap Shukla","twitter_misc":{"Written by":"Tej Pratap Shukla","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/"},"author":{"name":"Tej Pratap Shukla","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/ff3afbe1ac8838fe3a5246ab51b37a8c"},"headline":"Smartest Way to Perform IncrediMail Mailbox Forensics","datePublished":"2022-11-04T11:38:00+00:00","dateModified":"2025-11-07T11:49:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/"},"wordCount":884,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/07\/incredimail.png","keywords":["IncrediMail Mailbox Forensics"],"articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/","url":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/","name":"Incredimail Forensics \u2013 View & Analyze IncrediMail IMM Files","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/07\/incredimail.png","datePublished":"2022-11-04T11:38:00+00:00","dateModified":"2025-11-07T11:49:03+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/ff3afbe1ac8838fe3a5246ab51b37a8c"},"description":"Initiate with Incredimail Forensics to view & analyze .imm files. Carve evidence from .imm files by reading Incredimail emails forensically.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/07\/incredimail.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/07\/incredimail.png","width":696,"height":390,"caption":"IncrediMail mailbox forensics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/initiate-incredimail-mailbox-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"Smartest Way to Perform IncrediMail Mailbox Forensics"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/ff3afbe1ac8838fe3a5246ab51b37a8c","name":"Tej Pratap Shukla","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/477bdfb87b4a0b6b287b8e9aa10b59e78eb55a1f2f34d4caaa36e2f3754584cc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/477bdfb87b4a0b6b287b8e9aa10b59e78eb55a1f2f34d4caaa36e2f3754584cc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/477bdfb87b4a0b6b287b8e9aa10b59e78eb55a1f2f34d4caaa36e2f3754584cc?s=96&d=mm&r=g","caption":"Tej Pratap Shukla"},"description":"A versatile technocrat, always in the search for new and interesting areas related to technology. Works on multiple technical problems faced by users frequently. Provides the user-friendly solutions to deal with numerous technical issues.","sameAs":["https:\/\/www.linkedin.com\/in\/tej-pratap-shukla\/"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/tej\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":2,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/417\/revisions"}],"predecessor-version":[{"id":6757,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/417\/revisions\/6757"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/5172"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}