Based on infection rates we see, the newer Crypt0L0cker variant is one of the most common ransomwares which append a random extension (i.e. ,pzekaq, .ixopyw, .izozyn) to the end of all affected filenames.
Unfortunately, there is no free decryption solution for files encrypted by Crypt0L0cker. However, Dr.Web
has been able to assist victims with decrypting files...see here
Policy from Dr.Web (11/25/15): Free file decryption assistance only for PCs protected by Dr.Web at the moment of infection
If you're not a licensed user for a Dr.Web product you will have to pay for their services (Rescue Pack). Fees may vary depending on the infection and amount of data to be decrypted.
There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.
Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion.
To avoid unnecessary confusion, this topic is closed.
The BC Staff