Case Study: Intellectual Property Theft2022-09-26ContentsInvestigationInvestigationLook through registry, ntuser.dat, link files, shell bags, etc