Moved to epo managed area for a better chance of answering
The MFEEERM.exe tool gives us a hint that the drive itself and files on it are not encrypted, but a protected vault was created on the drive to contain encrypted data.
You can simply delete that vault if you no longer need it - it's probably visible if you view hidden files. If I remember correctly, the extension is .dsk
That was what I thought to do based on what I was finding before this post. I cannot locate the .dsk file even after viewing hidden files.
I launch the application and it shows me the protected content, but I am not finding a container that would be holding this content.
Any idea of the file structure that would help me understand what's going on? Would the container really just fill up all of the unused space on the drive for encrypting 2.5 GB of data? Or maybe the people who wanted the data protected are just not using the software effectively?
Look for hidden system files in a command prompt
Yes it's designed to fill the drive to stop the user copying files to the unprotected space.
The storage is still available, just in the vault.
The easier way to achieve this is:
- Plug the USB drive on a system which can decrypt it.
- Backup the content of the key
- Use the OS system format command
At my knowledge, it's the only way to achieve this.