Don't worry. It's pretty easy to tell if you have it.
When you open the infected program via desktop shortcut, nothing will happen, but the icon will disappear. It does this to preserve itself. Once executed, weird processes in Task Manager will start and end. It will still seen like nothing is happening.
During this time, CryptoLocker will attempt to connect to one of the malware writer's servers to set up a Public key and a Private key set. The Public key encrypts the files while the Private key decrypts them. CryptoLocker uses toe Public key to encrypt files that include Microsoft Office files, .jpg, .png, or any other image file. The Private key is stored on the server.
Once CryptoLocker is done encrypting the files, a window saying "Your personal files are Encrypted!" will appear on the screen, and the desktop background will be changed as well. The background says that if they're antivirus deleted the malware and you were willing to pay the ransom of $300 U.S. or 2 Bitcoin, you could redownload it from a website address they give you.
After 72 hours, the Private key will be deleted from the server. A fun thing to do with this virus is set the time back on the computer. You can set it back to the year 2000 and get more time xD. That's really the only way to keep the server from destroying the Private key.
To remove CryptoLocker, you can't run an antivirus. The reason why is because the virus will look for processes that can kill it. Most do, today at least. The weird part is that it only looks by name. Take Malwarebytes for example, CryptoLocker will kill the process if it's named "malwarebytes.exe". You would have to rename it to something like "joe.exe" to get Malwarebytes to even start.
And that, class, concludes our lesson on CryptoLocker...
Huge post xD, but it was worth it ouo