Hello Melvin. Sorry to hear that. The virus, upon infection, scans the computer and encrypts data based on file-types, targeting many types of files used in the enterprise, such as .PDF, .XLS, and .PPT to name a few. Upon encrypting the files, the virus will create a .TXT and .HTML file with instructions on how to obtain the decryption key, which will be available after paying the ransom stated (up to 3BTC). The decryption key will only be valid for up to 96 hours; after that time, the server will delete the decryption key, and the files will remain encrypted.
Unfortunately your files could not retrieved without the decryption key. Only suggestion can be given is to take regular backup of your files.
It has frozen all my files and slowed my computer down.
Hello Melvin. Sorry to hear that. The virus, upon infection, scans the computer and encrypts data based on file-types, targeting many types of files used in the enterprise, such as .PDF, .XLS, and .PPT to name a few. Upon encrypting the files, the virus will create a .TXT and .HTML file with instructions on how to obtain the decryption key, which will be available after paying the ransom stated (up to 3BTC). The decryption key will only be valid for up to 96 hours; after that time, the server will delete the decryption key, and the files will remain encrypted.
Unfortunately your files could not retrieved without the decryption key. Only suggestion can be given is to take regular backup of your files.