The online service "Decrypt CryptoLocker", by FireEye and Fox IT can only be used to decrypt files that were encrypted by the original Cryptoware, CryptoLocker. This is possible because during the Operation Tovar that was used to shut down the GameOver ZeuS botnet, which was used to distribute CryptoLocker, they seized servers were the private keys used for encryption were uploaded to. After that, they set up the DecryptCryptolocker.com website that allows you to upload a CryptoLocker encrypted file and it'll test it against the 50,000 private keys they retrieved from the server to see if one matches your file private key. If it does, they'll send you a decrypter executable along with your private key. Therefore, files encrypted by any other Cryptoware other than CryptoLocker cannot
be decrypted via this service.
Also, there's only 3 ways to get your files back when you get infected with CryptoWall 3:
- Restore them using the Shadow Volume Copy service, which was probably deleted during the infection;
- Restore them from a back up you took prior to the infection;
- Restore them by paying then ransom;
If the first and second options aren't available to you, the only one left will be the third one sadly. CryptoWall files cannot be decrypted, like Nathan explains i n the following post
. You can visit the support threads created for the CryptoWall infection and ask for assistance there and also give the CryptoWall FAQ a look.