Chapter 5 – File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System