Cert private keys are stored in the logged on user profile.
Most of those "recovery' softwares merely search the local HD, looking for keys to load, they don't actually break the encryption, all they do is search for keys to try.
On the exported (backed up keys), the user must have set a password...I assume you tried blank? This is part of the MS Cert Export tool, so I'm pretty sure Maxtor or whatever would not have set a password.
For OTHER users
When you try the domain account...
1. You must log on to the first DC in the domian, that's where the Administrator Cert was created in the Administrator profile.
2. Export the cert to file.
3. Now, log in to the device with the encrypted file (EFS encryption/decryption is LOCAL)
4. Import the cert from the file above.
5. Should be "good to go" <Taco Bell> 🙂
For the CBR Surfer:
If efsinfo is saying their are no RA keys associated with the files, you are in heap big trouble. Now you have to figure out a way to log on w/ the old id, and trigger the users' original profile (to get their EFS cert). When you went back to the NT4 domain...did you see which profile got loaded?
Before you ask, NO, you cannot just copy the old profile onto the new profile name.
Corrupted profiles drive 60% of my data recovery problem tickets right now.
PM or IM me later...gotta run to a meeting.