This case study involves the forensic analysis of a computer seized from an individual named Clark, who is suspected of accessing, owning, or distributing illegal digital content related to clowns. The analysis begins with a logical acquisition of the disk image using FTK Imager, followed by an overview of various forensic tools, including FTK Imager, Autopsy, and OS Forensics, with a focus on their features and installation procedures. The study identifies clown-related content, including images, videos, and PDF files, and presents them with justifications for their relevance. The intention of the analysis is explained, detailing the quantity of files discovered and the software installed on the computer. The report includes a running sheet and timeline of events to aid in the investigation and concludes with a summary of the findings and their implications.