If I recall correctly, the keys to encrypt and decrypt, are tied up in the credentials store of a working system.
Unless the customer backed up and exported them to make pfx keys before the system is nuked, then it's pretty much a lost cause.
Get a sample of a pfx key and grep search raw the reloaded drive and take a look.
The other possibility is if the system was part of a larger Windows domain or active directory. If that's the case, a system admin might be able to export the key if it was backed up centrally .
I had that before from someone who used personal HDD on a work laptop and then left that job finding all data was encrypted.
On a working system you import the pfx keys into the local credentials store and then in theory the drive data will be automatically decrypted
Good luck.