Hello Awais Shah,
Thank you for posting in Q&A forum.
Here’s where the challenges come in with your scenario:
- When you “move” encrypted data from your BitLocker‑encrypted C: drive to another drive (D:), you’re no longer on the original BitLocker volume. In most normal file copies (e.g., via Windows Explorer when the drive is unlocked) the encryption is removed on the fly so that the files appear decrypted on the destination. However, if you somehow copied the raw encrypted data (for example, via a sector‐by‐sector backup or image copy), then you effectively have data that is still in its encrypted form.
- The 48‑digit recovery key you saved is tied to the encryption of the original C: drive—it works in conjunction with the BitLocker metadata (including the volume header and key protectors) originally stored on that drive. Once you formatted that drive, you lost that header and the associated metadata unless you took explicit steps to back it up.
- Even if you log on to your new Windows installation with the same Microsoft account that has a copy of your recovery key, the recovery key by itself isn’t enough to decrypt arbitrary encrypted files if they aren’t part of a BitLocker‐managed volume. The recovery key is used to unlock (or “recover”) the entire volume by decrypting the volume key stored in the header; it isn’t designed as a file decryption tool.
You can check Bitlocker encryption information by running command:
Manage-bde -protectors -get c:
Note: Please removed the forward slash after the c:
And compare the Bitlocker encryption information with the Bitlocker encryption key you saved.
For example (in my case, it is D:):
I hope the information above is helpful.
If you have any questions or concerns, please feel free to let us know.
Best Regards,
Daisy Zhou
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.