Some ransomeware has had flaws in the encryption discovered in the past (kaspersky did a while ago) Other security researchers more recently broke into the criminals servers and stole the database of keys and made them public. Based on that the answer is to put the hard drive to one side and keep an eye out for news. The long game is the only game to play here unless you pay.
I remember this thread but I don't know if it will work you: https://www.wilderssecurity.com/thr...infected-by-cryptolocker.366871/#post-2397679
Sorry not helping I know and just stating the obvious, but you should have backed up all your files - just in case something happened such as this. Good luck with getting it sorted.
Depends on the ransomware, some encrypt the files, some just hide them ( usually to a temp folder ) Have you removed the ransomware, and what was/it called ?
Yes Bleeping computer is your best bet, here is an information link about Cryptobit http://www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware-information Also bleeping computer has an infection removal section where you can seek personal help http://www.bleepingcomputer.com/forums/f/103/am-i-infected-what-do-i-do/