Any files that are encrypted with the Locky (.ZEPTO) ransomware variant will be renamed with random alpha-numerical characters and have the .zepto extension appended to the end of the encrypted data filename (i.e. 024BCD33-41D1-ACD3-3EEA-84083E322DFA.zepto) and leave files (ransom notes) named _(4_digit_number)_HELP_instructions.txt/.bmp/.html (i.e. _6789_HELP_INSTRUCTIONS.txt, _6789_HELP_INSTRUCTIONS.bmp, _6789_HELP_INSTRUCTIONS.html) as explained here.
Unfortunately, there is no known way at this time to decrypt files encrypted by Locky variants regardless of the extension without paying the ransom.
Most crypto malware ransomware is typically programmed to automatically remove itself...the malicious files responsible for the infection...after the encrypting is done since they are no longer needed. The encrypted files do not contain malicious code so they are safe.
If you need individual assistance only with removing the malware infection, follow the instructions in the Malware Removal and Log Section Preparation Guide...all other questions or comments should be posted in the support topics. When you have done that, start a new topic and post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.
Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion link provided by buddy215...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.
The BC Staff