This computer forensics case study investigates a scenario involving alleged access to clown-related content, which is illegal in Western Australia. The case study analyzes a forensic image of a hard drive, acquired using FTK Imager, and explores the use of forensic tools like Autopsy and OSForensics. The investigation focuses on key issues, including presenting content related to the offense, identifying ownership, determining the intention behind the actions, assessing the quantity of files, and identifying installed software. The student utilizes these tools to examine the evidence and address the issues. The investigation also covers the resources utilized, including the suspect, the system, the forensic image, and the forensic tools used. The case study provides a detailed explanation of the tools and their functionalities, such as FTK Imager, Autopsy, and OSForensics, and how they are used to create forensic images, preview files, export data, create file hashes, and analyze digital evidence.