Dom Ransomware Mentions No Ransom Amount

Dom ransomware is a piece of file-encrypting malware that can infect Windows machines. The ransomware does not belong to a specific family of clones.
Dom encrypts most files found on the victim system and all connected drives. Affected file types will include media files, documents, archives and executables.
Encrypted files receive a multi-part extension that consists of the victim's ID string, the email used by the ransomware operator and the ".dom" string. This will turn a file named "document.doc" into "document.doc.[victim ID].[dekrypt666@onionmail.org].dom".
Once encryption completes, the ransomware drops its ransom demands inside a file named "ENCRYPTED.txt", which is placed on the system desktop. The full ransom note goes as follows:
!!! ALL YOUR FILES ARE ENCRYPTED !!!
All your files, documents, photos, databases and other important files are encrypted.
You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key.
Only we can give you this key and only we can recover your files.
Do you really want to restore your files?
You can write us to our mailboxes: dekrypt666 at onionmail dot org
(in subject line please write your MachineID: - and LaunchID: -)
Attention!
* Do not rename encrypted files.
* Do not try to decrypt your data using third party software, it may cause permanent data loss.
* Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.