From a sans.org article and the associated web links:
http://www.sans.org/newsletters/newsbites/newsbites.php?vol=15&issue=84#sID306
http://www.theregister.co.uk/2013/10/18/cryptolocker_ransmware/
Destructive malware “CryptoLocker” on the loose – here’s what to do
The ransom is 2 bitcoins within 3 days.
A decryption service is 10 bitcoins. From a sans.org article:
CryptoLocker Ransomware Gets a Decryption Service
http://www.sans.org/newsletters/risk/volume13/13-45.php
http://thehackernews.com/2013/11/CryptoLocker-Ransomware-Decryption-service-malware-keys.html
Update: June 10, 2014
Ransomware Stores Decryption Key on Infected Machines
http://www.sans.org/newsletters/newsbites/newsbites.php?vol=16&issue=27#sID300
This means depending on the version of ransomware, that get installed, you may possibly may decrypt your drive.
To find this folder you need to search for %appdata%, It will take you to a hidden folder c:/Users/ _user_ / AppData / Roaming
then locate the folderĀ Microsoft / Crypto / RSA
This applies to CryptoDefense and not Cryptolocker.
Update: Aug 10, 2014
Related post June 2014:
kpon.wordpress.com/2014/06/05/cryptolocker-and-gameover-zeus/