So, since a linked clone redirects: C:\Users\User\AppData\Roaming to the persistent disk specified in the pool settings (in this case U:\) then the Cryptolocker infestation is not removed.
Any ideas on a best strategy for protecting linked clones? The CryptoLock Prevention Toolkit?
-John