This case study delves into a digital forensics investigation concerning the illegal access of clown-related digital content in Western Australia. The investigation begins with an allegation and the seizure of a computer. The case study details the challenges arising from a junior investigator's actions, including a logical acquisition and the wiping of the original hard drive. The analysis involves using tools like 7-Zip for file extraction and Autopsy for evidence identification and analysis. The report examines issues related to the presentation of content, identification of files, intent, quantity of files, and installed software. The investigation also explores the use of keyword searches and email analysis to uncover relevant information. The suspect denies the charges, adding complexity to the case. The study highlights the importance of proper forensic procedures, including the use of appropriate warrants and the preservation of evidence. The analysis covers the identification of deleted files and the interpretation of search results, providing a comprehensive overview of the digital forensics process in this scenario.