Windows Forensics – A Case Study: Part Two