How to Fix a USB Drive That Has Turned Into RAW Format

Date: 27/07/2025

Imagine inserting a USB drive into your computer and seeing the message: “To use the disk in drive F:, you need to format it first. Do you want to format it?” If it’s a new USB drive, there’s no question, but what if it had data on it? In that case, don’t rush to agree to format it—there might be a chance to recover the data.
USB drive in RAW format
USB drive in RAW format

The first thing you might want to try is using Windows tools to fix the errors. To do this, open the command prompt as an administrator and type:

chkdsk f: /f

Naturally, you’ll need to replace “f:” with the current drive letter. The /f parameter indicates that errors should be fixed during the scan.

If the operation was successful, you can try opening the files. However, you might encounter the error “Chkdsk is not available for RAW drives.” Don’t worry, we have a couple of other options up our sleeve. Let’s use a specialized program called DMDE.

DMDE is an impressive program that’s useful for searching, editing, and recovering data on disks. The developer claims it employs advanced algorithms that enable it to restore directory structures and files in complex situations where other programs may not succeed.

DMDE includes a disk editor, a basic partition manager, and the ability to create images and clone disks, as well as reconstruct RAID arrays, among other features. The paid versions support unrestricted file and directory recovery, but the free version is also quite effective and helpful in many situations.

After launching the program, select your storage device.

Selecting the drive
Selecting the drive

A window with sections opens, where we select full scan by double-clicking.

Start scanning.
Start scanning.

After the quick scan, navigate up to the “Found” folder and click on “All found + reconstruction.” A dialog box will open where you should select “Rescan the current file system” and then wait for the operation to complete.

Scanning dialog
Scanning dialog

After scanning, DMDE will display a list of found files. Browse through the folders and select what you want to recover. Unfortunately, the free version does not allow you to recover entire folders. To recover individual files, right-click on the file, select “Restore Object,” then specify the destination for recovery and click OK.

File Recovery
File Recovery

It is worth noting that file names are generated automatically and often do not match the originals. Don’t be surprised if some files are “corrupted” or if artifacts appear in the photos. Interestingly, images can sometimes be restored using special utilities. For example, Recuva or R-Studio. To my great surprise, the last program managed to restore almost completely damaged photos to a very good quality with minimal artifacts—many of its competitors failed to achieve this.

In summary, good luck with the recovery! However, it’s best to immediately transfer all data from temporary storage and create backups.

Related posts:
2022.06.01 — Routing nightmare. How to pentest OSPF and EIGRP dynamic routing protocols

The magic and charm of dynamic routing protocols can be deceptive: admins trust them implicitly and often forget to properly configure security systems embedded in these protocols. In this…

Full article →
2023.02.21 — SIGMAlarity jump. How to use Sigma rules in Timesketch

Information security specialists use multiple tools to detect and track system events. In 2016, a new utility called Sigma appeared in their arsenal. Its numerous functions will…

Full article →
2022.02.09 — First contact: An introduction to credit card security

I bet you have several cards issued by international payment systems (e.g. Visa or MasterCard) in your wallet. Do you know what algorithms are…

Full article →
2023.02.13 — Ethernet Abyss. Network pentesting at the data link layer

When you attack a network at the data link layer, you can 'leapfrog' over all protection mechanisms set at higher levels. This article will walk…

Full article →
2022.01.13 — Bug in Laravel. Disassembling an exploit that allows RCE in a popular PHP framework

Bad news: the Ignition library shipped with the Laravel PHP web framework contains a vulnerability. The bug enables unauthorized users to execute arbitrary code. This article examines…

Full article →
2023.02.12 — Gateway Bleeding. Pentesting FHRP systems and hijacking network traffic

There are many ways to increase fault tolerance and reliability of corporate networks. Among other things, First Hop Redundancy Protocols (FHRP) are used for this…

Full article →
2022.02.15 — Reverse shell of 237 bytes. How to reduce the executable file using Linux hacks

Once I was asked: is it possible to write a reverse shell some 200 bytes in size? This shell should perform the following functions: change its name…

Full article →
2023.01.22 — Top 5 Ways to Use a VPN for Enhanced Online Privacy and Security

This is an external third-party advertising publication. In this period when technology is at its highest level, the importance of privacy and security has grown like never…

Full article →
2022.12.15 — What Challenges To Overcome with the Help of Automated e2e Testing?

This is an external third-party advertising publication. Every good developer will tell you that software development is a complex task. It's a tricky process requiring…

Full article →
2023.02.21 — Pivoting District: GRE Pivoting over network equipment

Too bad, security admins often don't pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What…

Full article →