This document provides an overview of the CryptoLocker ransomware through a case study analysis. It describes how CryptoLocker works, including how it propagates, encrypts files, and demands ransom payments. The document then analyzes a specific TeslaCrypt infection through forensic tools to understand artifacts left on the system and prevention measures. It concludes with references for further reading on ransomware trends.