
- #UFS EXPLORER PROFESSIONAL RECOVERY 9.1 KEY SOFTWARE#
- #UFS EXPLORER PROFESSIONAL RECOVERY 9.1 KEY TRIAL#
- #UFS EXPLORER PROFESSIONAL RECOVERY 9.1 KEY PASSWORD#
Yes newer version has Bitlocker recovery feature from damaged volumes. Bitlocker might not be the issue as it is having clear key & can get decrypted. I think fundamental problem is with boot sector which is altogether missing. Partition.Since C drive is easily get decrypted and is fully accessible is there any way to get Bitlocker Key (. I do not know whether Diskinternal EFS recovery has actually traced Boot sector and created virtual Bitlocker partition.īut I have imaged this Recovered bitlocker partition on a SSD and mounted it with the hope this will be valid bitlocker partition, but it is same like actual 300GB
#UFS EXPLORER PROFESSIONAL RECOVERY 9.1 KEY PASSWORD#
So a tool not only must detect bitlocker partition, mount it and ask for password to enter.īoth UFS & diskinternals have one of the feature which are required for this case. When I tried to mount this partition it asked for Bitlocker password ( since it has not auto decryption type mechanisam for clear key passwords) Interestingly I tried to run Diskinternal EFS recovery and it has detected Bitlocker encrypted partition.Since both PC3K and UFS explorer could not detect this volume. I have extensively searched 300GB partition starting from Sector 346218496 but could not find FVE-FS sector though FVE string is there. BTW I am no expert on Bitlocker I am just reasoning, if partition tables are off file recovery tools may have trouble finding what they're looking for if we rely on those 'off' partition tables. Or we could point our file recovery tools at those, help them a bit so to speak.īut perhaps it is as you say and key sectors needed to decrypt weren't copied. If we find occurrences we can dump sectors, decode them and see what that mean for partition tables / cross reference with what we see in partitions TAB.

There may of course be legit reasons for this, but it's something I'd look into. I am suggesting because on my disks next partition starts at end LBA + 1 of previous partition and not all partitions seem to follow this in DMDE partitions window. Both these are pretty unique to boot sector of encrypted volumes, you can actually see them in the dump of the FVE-FS sector you posted. Then we could match these to partitions TAB of DMDE. You could do search for "3b d6 67 49 29 2e d8 4a 83 99 f6 a3 39 e3 d0 01" (hex) and note down LBA addresses for occurrences.
#UFS EXPLORER PROFESSIONAL RECOVERY 9.1 KEY SOFTWARE#
Is there any way or any software I can try ? I have attached fist 10000 sectors of this 300GB space. Again UFS explorer has decrypted C drive ( I think UFS explorer is among the few softwares which can decrypt Bitlocker)īut UFS explorer could not find any trace of partition.
#UFS EXPLORER PROFESSIONAL RECOVERY 9.1 KEY TRIAL#
I have tried UFS explorer ( trial version 9.1 64 Bit). Bitlocker from C drive has been decrypted easily in PC 3K and data is fully recoverable.īut due to bad sectors partition & bitlocker metadata might have been lost as this partition is not coming in PC3K. But only few bad sectors were skipped.ĭisk was having 2 partitions.

It was having head issues.Īfter head transplant we have cloned disk using 2-3 heads. I have got a 500 GB laptop hard disk from a corporate customer.
