How to Fix a USB Drive That Has Turned Into RAW Format

Date: 27/07/2025

Imagine inserting a USB drive into your computer and seeing the message: “To use the disk in drive F:, you need to format it first. Do you want to format it?” If it’s a new USB drive, there’s no question, but what if it had data on it? In that case, don’t rush to agree to format it—there might be a chance to recover the data.
USB drive in RAW format
USB drive in RAW format

The first thing you might want to try is using Windows tools to fix the errors. To do this, open the command prompt as an administrator and type:

chkdsk f: /f

Naturally, you’ll need to replace “f:” with the current drive letter. The /f parameter indicates that errors should be fixed during the scan.

If the operation was successful, you can try opening the files. However, you might encounter the error “Chkdsk is not available for RAW drives.” Don’t worry, we have a couple of other options up our sleeve. Let’s use a specialized program called DMDE.

DMDE is an impressive program that’s useful for searching, editing, and recovering data on disks. The developer claims it employs advanced algorithms that enable it to restore directory structures and files in complex situations where other programs may not succeed.

DMDE includes a disk editor, a basic partition manager, and the ability to create images and clone disks, as well as reconstruct RAID arrays, among other features. The paid versions support unrestricted file and directory recovery, but the free version is also quite effective and helpful in many situations.

After launching the program, select your storage device.

Selecting the drive
Selecting the drive

A window with sections opens, where we select full scan by double-clicking.

Start scanning.
Start scanning.

After the quick scan, navigate up to the “Found” folder and click on “All found + reconstruction.” A dialog box will open where you should select “Rescan the current file system” and then wait for the operation to complete.

Scanning dialog
Scanning dialog

After scanning, DMDE will display a list of found files. Browse through the folders and select what you want to recover. Unfortunately, the free version does not allow you to recover entire folders. To recover individual files, right-click on the file, select “Restore Object,” then specify the destination for recovery and click OK.

File Recovery
File Recovery

It is worth noting that file names are generated automatically and often do not match the originals. Don’t be surprised if some files are “corrupted” or if artifacts appear in the photos. Interestingly, images can sometimes be restored using special utilities. For example, Recuva or R-Studio. To my great surprise, the last program managed to restore almost completely damaged photos to a very good quality with minimal artifacts—many of its competitors failed to achieve this.

In summary, good luck with the recovery! However, it’s best to immediately transfer all data from temporary storage and create backups.

Related posts:
2023.07.20 — Evil modem. Establishing a foothold in the attacked system with a USB modem

If you have direct access to the target PC, you can create a permanent and continuous communication channel with it. All you need for this…

Full article →
2022.01.11 — Persistence cheatsheet. How to establish persistence on the target host and detect a compromise of your own system

Once you have got a shell on the target host, the first thing you have to do is make your presence in the system 'persistent'. In many real-life situations,…

Full article →
2022.01.01 — It's a trap! How to create honeypots for stupid bots

If you had ever administered a server, you definitely know that the password-based authentication must be disabled or restricted: either by a whitelist, or a VPN gateway, or in…

Full article →
2023.02.21 — Pivoting District: GRE Pivoting over network equipment

Too bad, security admins often don't pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What…

Full article →
2022.02.09 — Kernel exploitation for newbies: from compilation to privilege escalation

Theory is nothing without practice. Today, I will explain the nature of Linux kernel vulnerabilities and will shown how to exploit them. Get ready for an exciting journey:…

Full article →
2023.01.22 — Top 5 Ways to Use a VPN for Enhanced Online Privacy and Security

This is an external third-party advertising publication. In this period when technology is at its highest level, the importance of privacy and security has grown like never…

Full article →
2022.04.04 — Fastest shot. Optimizing Blind SQL injection

Being employed with BI.ZONE, I have to exploit Blind SQL injection vulnerabilities on a regular basis. In fact, I encounter Blind-based cases even more frequently…

Full article →
2022.12.15 — What Challenges To Overcome with the Help of Automated e2e Testing?

This is an external third-party advertising publication. Every good developer will tell you that software development is a complex task. It's a tricky process requiring…

Full article →
2022.06.01 — Routing nightmare. How to pentest OSPF and EIGRP dynamic routing protocols

The magic and charm of dynamic routing protocols can be deceptive: admins trust them implicitly and often forget to properly configure security systems embedded in these protocols. In this…

Full article →
2023.03.26 — Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques

Chances are high that you had dealt with DHCP when configuring a router. But are you aware of risks arising if this protocol is misconfigured on a…

Full article →