This case study report details a computer forensics investigation into the illegal possession of clown-related digital content. The investigation, prompted by an allegation of clown content access, involves analyzing a 19 GB forensic image of a suspect's computer. The report outlines the use of forensic tools, including FTK Imager and Autopsy, to examine the image. The analysis focuses on five key issues: the presentation of clown content, identification of the suspect, the intention behind accessing the content, the quantity of relevant files, and the installed software. The report provides a step-by-step process of the investigation, including screenshots. The report also details the resources required for the investigation, including the tools used and their characteristics, and presents the findings related to the clown content, suspect identification, and intent, as well as the file quantity and software analysis. The report concludes with a summary of the findings and references used in the investigation.