My idea for reading the file content: Create a dummy-file in the vault, identify the file (and folder) in the crypted vault (e.g. sort all files by date, the newest ist the dummy file), copy the file in the crypted folder, copy crypted name of the dummy file, delete the dummy file an rename the file (with name from dummy file), than you can read the content in the decrypted vault.
Just an idea of mine, no official way, I don’t know if that’s okay or if something can break.
I have no idea to find out original position or name, and you had find out the original filetype.
If the file is still inside the vault structure, you can find out the encrypted name by the procedure @Rainer described. For the next bigger Cryptomator version (1.7.0 ), we plan to implement an easier way.