You are dealing with Dharma Ransomware, not Btcware Ransomware.
...all of my files look like that
Any files that are encrypted with Dharma (CrySiS) Ransomware will have an id-<8 random hexadecimal characters>.[<email>] followed by the .dharma, .wallet, .zzzzz, .onion, .cesar, .arena, .cobra or .java extension appended to the end of the encrypted data filename (i.e. .id-A04EBFC2.[firstname.lastname@example.org].dharma, .id-480EB957.[email@example.com].wallet, .id-5FF23AFB.[Asmodeum_daemonium@aol.com].onion, .id-EB214036.[firstname.lastname@example.org].zzzzz, .id-01234567.[email@example.com].cesar, id-BCBEF350.[firstname.lastname@example.org].arena, .id-BCBEF350.[email@example.com].cobra, .id-406B4F5A.[firstname.lastname@example.org].java).
Unfortunately, there is no known method to decrypt files encrypted by the .java variant of Dharma (CrySiS) without paying the ransom. If possible, your best option is to restore from backups, try file recovery software or backup/save your encrypted data as is and wait for a possible solution at a later time.
There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance.