File Corruption
File corruption is when a file’s contents are partially scrambled or truncated such that the application opening it can’t make sense of the bytes. The storage drive may be perfectly healthy; the file system around the file may be intact. The damage is at the file level. The recovery path depends on which file is corrupted, what type, and what caused the corruption in the first place.
Officerecovery · Aesonlabs
or media corruption
Recovery practices
File corruption is the unintended alteration or partial loss of a file’s data, leaving the file unable to open correctly or unable to open at all. The file itself is the unit of failure: the storage medium and the file system around it may be entirely healthy. Causes include write interruptions, application bugs, malware, bit-flip errors, format mismatches, and gradual media wear. File corruption is distinct from file system corruption, which affects the directory structures pointing to files, and from broader storage failures where the drive itself stops responding.
What File Corruption Actually Is
File corruption means the bytes that make up a file’s contents have been altered, lost, or scrambled in a way that prevents the application from interpreting them correctly. The file itself is the unit of failure. The drive’s hardware may be reading and writing perfectly. The file system locating the file on disk may be entirely intact. Other files on the same drive may open without any issues. Only the affected file’s content has been damaged.1
How a corrupted file looks to applications
The exact symptom depends on the file format and what was damaged:
- Refusal to open: the application reports the file is corrupted, damaged, or in an unrecognized format. Common with documents, archives, and structured formats where damaged headers prevent any interpretation.
- Partial open with missing content: the file opens but parts are blank, truncated, or replaced with placeholder content. Common with media files where damaged frames or sections become unreadable.
- Visual artifacts: images display with garbled colors, repeated patterns, or missing regions. Audio files play with static or skips. Videos play with blocky artifacts or playback failures.
- Application crashes when opening: the parser inside the application encounters malformed data and fails ungracefully. Less common in modern applications with defensive parsing.
- Silently incorrect content: the file opens normally but contains wrong data. The hardest type to detect; a numeric value in a spreadsheet may be subtly altered without any visual indication.
The “single file vs many files” diagnostic
The pattern of which files are affected tells you something about the cause. One specific file failing while others on the same drive open normally is a different problem from many files failing simultaneously.
| Pattern | Likely cause | First step |
|---|---|---|
| Single file affected | Application crash during save, file-specific malware | Application repair tool (Open and Repair) |
| Files in one directory affected | Sync error, application bug, ransomware | Version history retrieval |
| Files across whole drive affected | File system corruption or media failure | SMART check, then CHKDSK or fsck |
| Files of same type across drives | Application bug, format incompatibility | Application update or reinstall |
| Files appearing fine but content wrong | Silent corruption, possibly hardware | Compare with known-good backup |
File-Level vs File-System-Level Corruption
Most articles about “corrupted files” conflate two different problems. The distinction matters because the recovery approaches are entirely different.2
File-level corruption
The file’s bytes are damaged. The file system that locates the file is intact: Windows or macOS finds the file at its correct path, reports its correct size, can read the bytes off disk. The damage is in the bytes themselves, not in finding them. Recovery happens at the application level (Open and Repair, version history) or with format-specific repair tools that understand the file format and can rebuild damaged sections.
File-system-level corruption
The structures that organize files on disk are damaged. The Master File Table (NTFS), the directory entries (FAT32), the catalog file (HFS+), or equivalent structures on other file systems hold pointers to where files live. If those structures are damaged, the operating system can’t find files even when the files themselves are intact on disk. Recovery happens at the file-system level: CHKDSK, fsck, or partition recovery tools like TestDisk. If the file system is severely damaged, the volume may show as RAW in Disk Management.
Why the distinction matters
Tools designed for one don’t work for the other. Running CHKDSK on a single corrupted file does nothing; CHKDSK only fixes file system structures. Conversely, opening a Word document with a corrupt MFT entry won’t help if the document file itself is fine but Windows can’t locate it. Diagnosis first, tool selection second. The “single file vs many files” pattern from above is the clearest indicator: single file = application or file-level, many files across the drive = file system or media level.
What Causes File Corruption
Several distinct mechanisms produce file corruption. Understanding which mechanism applies to your situation helps choose the right recovery path.3
Write interruption
The most common cause. When an application saves a file, it issues a series of write operations to the storage system. If those operations are interrupted before completion, the file ends up partially written. Causes include power loss during save, system crash, application crash, or improper disconnect of an external drive while a write is in progress. Modern applications mitigate this with techniques like write-then-rename (write to a temporary file, then atomically rename) but not all applications use these patterns.
Application bugs
Software bugs in the application that creates the file can produce malformed output. The file is “born corrupt” because the application generated invalid bytes. This is more common during rapid software releases, in beta versions, or after operating system updates that change underlying APIs. Affected files are often unrecoverable through file repair tools because the bytes were never correct; recovery means recreating the content.
Malware
Malware including ransomware deliberately damages files to make them inaccessible. Ransomware encrypts files; other malware variants randomly damage files to disrupt operations. Detection is usually obvious (many files affected at once, ransom notes appear, file extensions changed), but some variants damage files quietly to evade detection until extensive damage has accumulated. Recovery requires either restoration from backups or, in rare cases, decryption keys recovered from law enforcement takedowns.
Bit-flip errors
Storage media and memory occasionally suffer single-bit errors from electrical noise, cosmic ray interactions, or aging hardware. A single bit changing in a file can render it unreadable if the affected bit is in a header or critical structure. Modern drives include error-correction coding that catches and fixes most bit-flips before they reach the user, but some still get through. ECC RAM mitigates bit-flips in memory; consumer systems typically don’t include ECC.
Format mismatch
Files can appear corrupt when opened in applications that don’t fully support the format used to create them. The file isn’t actually corrupted; the destination application can’t interpret it correctly. Common scenarios: opening a newer Office document in older Office versions, opening a Pages document in Word, or opening a Photoshop file in a free editor that doesn’t support all features. The fix is opening with a compatible application or converting the format.
Media wear
Storage media eventually wears out. Hard drives develop bad sectors; SSDs reach NAND wear-out limits. Files stored on aging media can become corrupt as the underlying storage cells fail. SMART data and periodic surface scans catch this proactively. Files in the affected sectors may already be unreadable when discovered; the rest of the drive may still be healthy.
Silent Corruption and Why It’s Dangerous
Silent corruption is file corruption that goes undetected for extended periods because the file appears to work normally on casual access. The corruption sits in parts of the file that aren’t usually read. Documents may have damage in pages users haven’t reached. Videos may have damage in late frames users haven’t watched. Database files may have corruption in records that haven’t been queried.4
The cascading-failure problem
Wikipedia describes silent corruption as causing cascading failures: a system runs for a period of time with undetected initial errors, causing increasingly more problems until ultimately detected. For example, file system metadata corruption can result in multiple files being partially damaged or made completely inaccessible as the file system continues being used in its corrupted state. By the time silent corruption surfaces, the damage may have spread.
Why backups can be silently corrupted
Backups copy whatever state the source is in. A backup taken from a silently-corrupted source contains the same silent corruption. If the corruption isn’t detected before the source is lost or overwritten, the backup that should have been the safety net contains the same damage. This is particularly insidious for archive backups not regularly tested; the corruption may go unnoticed for years until the archive is needed.
Detection requires active checking
Silent corruption can’t be detected by simply opening files casually. Detection requires:
- Checksums: file systems with built-in checksumming (ZFS, Btrfs) detect bit-level corruption automatically. Consumer file systems (NTFS, FAT32, APFS, exFAT) don’t include this.
- Periodic verification: running file integrity checks against known-good hashes catches corruption proactively.
- Backup test restores: periodically restoring from backups and verifying contents catches silent corruption in archives.
- Application-level integrity: some applications include their own checksum verification (Git, archive formats with internal CRC).
Recovering Corrupted Files
Recovery for corrupted files follows a tiered approach: start with the cheapest, fastest options that don’t require any specialized tools, escalate to format-specific repair if those fail, and reach for general data recovery software only when the corruption resulted from storage failure rather than application errors.5
Tier 1: Application-level repair
Many applications include built-in repair functions for their own file formats:
- Microsoft Office: Open and Repair. File → Open → Browse → select file → click drop-down arrow next to Open → Open and Repair. Works on Word, Excel, and PowerPoint files with header damage.
- Adobe applications: Photoshop, Illustrator, and InDesign have crash recovery that opens auto-saved versions automatically.
- Archive programs (7-Zip, WinRAR): have repair functions for damaged archives that can extract intact portions.
- VLC and other video players: can sometimes play damaged video files when other players cannot, by skipping unreadable sections.
Tier 2: Previous version retrieval
If the application doesn’t have a built-in repair, retrieve a previous version of the file:
- Windows File History: right-click the file → Properties → Previous Versions tab. Requires File History to have been enabled before the corruption.
- macOS Time Machine: open the file’s location → enter Time Machine → navigate to a date before corruption.
- OneDrive, Google Drive, Dropbox: all maintain version history. Check the cloud service’s web interface for previous versions.
- Office 365 AutoSave: if AutoSave was enabled, version history is available within the file’s Info pane.
- Source control: for code or text files in a Git repository, previous versions are always available.
Tier 3: Format-specific repair tools
Specialized tools for specific file types:
- JPEG/PNG: tools like Stellar Repair for Photo, JPEG Recovery, and others can rebuild image files with damaged headers.
- Video files: Stellar Repair for Video, Wondershare Repairit, and others repair MP4/MOV/AVI files.
- SQL databases: dbForge, Stellar Repair for SQL, and database vendor tools repair corrupt databases.
- PDF files: Adobe Acrobat’s repair function plus third-party tools for severely damaged PDFs.
Tier 4: Data recovery software
If the corruption resulted from storage failure rather than application errors, general data recovery approaches apply. Image the drive first with ddrescue, then run recovery software against the image to extract files via file carving based on file signatures. Tools like EaseUS Data Recovery, R-Studio, and PhotoRec can recover files when the file system is damaged, but they recover the file as it exists on disk; if the file’s bytes were corrupted before the file system damage, recovery yields the corrupted bytes.
File corruption is the recovery scenario where the right tool depends entirely on diagnosing the cause correctly. The application-level repair tools, the version-history retrieval methods, and the data recovery software each address different problems; using a tool from the wrong tier wastes effort. Most user-facing “my file is corrupt” situations resolve at Tier 1 or Tier 2 (Open and Repair, or grabbing a previous version from cloud sync) without ever needing recovery software.6
The “single file vs many files” diagnostic is the most efficient way to route a corruption complaint to the right tier. A single corrupted spreadsheet is almost always an application or write-interruption issue addressable at Tier 1 or 2. Many corrupted files across a drive almost always indicate file system or media problems requiring different tools entirely. The mistake the typical SERP article makes is offering a flat list of fixes without ordering them by which problem each fix actually addresses; the right framing leads with the diagnostic question and uses the answer to choose the tool.
Silent corruption is the long-tail risk that most users don’t think about until it surfaces. Periodic backup verification, file system selection (where ZFS or Btrfs are options), and SMART monitoring are the practical defenses. Recovery software handles most file-corruption scenarios well when used at the right tier, but the most reliable defense is detection: knowing about corruption while a known-good source still exists is what makes recovery possible. By the time a corrupted file is the only copy that exists, the recovery options narrow substantially.
File Corruption FAQ
File corruption is when a file’s contents are partially altered, scrambled, or truncated such that the application opening it can’t make sense of the data. The file may fail to open entirely, may open with errors or missing content, or may appear corrupted only when specific parts are accessed. The corruption is at the file level: the file system that locates the file on disk is intact, but the bytes making up the file’s contents have been damaged. This is distinct from file system corruption, which affects the directory structures pointing to files, and from broader storage failures where the drive itself stops responding.
The most common cause is write interruption: power loss, system crash, or improper disconnect during a file save leaves the file partially written. Other causes include application bugs that produce malformed output, malware that deliberately damages files, bit-flip errors from electrical noise or aging media, format mismatches when files are transferred between systems, and gradual storage media wear. The pattern of corruption is diagnostic: a single corrupted file usually indicates an application or write-interruption issue, while many corrupted files across the same drive suggest media or file system problems.
Sometimes, depending on the cause and file type. The first thing to try is the application’s built-in repair: Microsoft Office has Open and Repair, photo formats like JPEG often have partial-recovery tools, video files have format-specific repairers like Stellar Phoenix Video Repair. The second option is previous-version retrieval through Windows File History, OneDrive version history, or macOS Time Machine. The third option is specialized file repair software for the specific format. The fourth option is signature-based recovery from disk images if the corruption resulted from storage failure rather than application errors. Files corrupted by write interruption have better recovery odds than files corrupted by malware, which actively scrambles the data.
File corruption affects the contents of individual files: the bytes making up a specific document or image are damaged, but the file system can still locate the file. File system corruption affects the structures that organize files on the drive: the Master File Table on NTFS, the directory entries on FAT32, the catalog file on HFS+. File system corruption can make many files inaccessible at once even if the file contents are intact. The diagnostic clue: if one specific file is broken but others on the same drive open fine, it’s file corruption. If files across the drive fail simultaneously, the problem is at the file system level, often surfacing as RAW partition status or as CHKDSK errors when the volume is accessed.
Silent corruption is file corruption that goes undetected for extended periods because the file appears to work normally on casual access. The corruption may affect data not normally read (rarely-used pages of a long document, late frames of a video, deeply-nested elements of a database) and only surface when those specific portions are accessed. Silent corruption is particularly dangerous for backups: a backup containing silently corrupted files may not be detected as defective until restoration, by which point the original may also be lost. Modern file systems like ZFS and Btrfs include checksumming features that detect silent corruption proactively; consumer file systems like NTFS, FAT32, and APFS do not.
Several practices substantially reduce file corruption risk. Use a UPS for desktop systems to prevent abrupt power loss during writes. Always use Safe Eject when removing external drives instead of pulling them out during operation. Keep applications updated to fix bugs that produce malformed output. Run periodic SMART checks on drives to catch failing media before silent corruption begins. Maintain version-controlled backups so a corrupted current version can be restored from a previous one. Use file systems with checksumming for important data when possible (ZFS or Btrfs on Linux, ReFS on Windows Server). Run periodic CHKDSK or fsck checks on volumes to catch file system issues before they cascade into file corruption.
Related glossary entries
- RAW Partition: file-system-level corruption surfacing as RAW status in Disk Management.
- Bad Sectors: physical storage failures that can cause files in those sectors to corrupt.
- NTFS: Windows’ file system; includes journaling that mitigates some corruption types.
- Data Recovery: the umbrella concept; file corruption is one recoverable scenario.
- File Carving: signature-based recovery used when file system damage hides files.
- Disk Image: image first when corruption resulted from media failure.
- CRC Error: a related symptom often surfacing when corrupted files are accessed.
Sources
- HowToGeek: What Is a Corrupted File, and Is There a Way to Get It Back? (accessed May 2026)
- Wikipedia: Data corruption
- CaseGuard: Why Is My File Corrupt? How to Fix it
- Aesonlabs: Can Data Become Corrupt Out of Nowhere?
- OfficeRecovery: How to Fix Corrupted Files: Over 30 File Types
- Fields Data Recovery: What is a corrupted file and can my data be recovered?
About the Authors
Data Recovery Fix earns revenue through affiliate links on some product recommendations. This does not influence our reference content. Glossary entries are written and reviewed independently based on documented research, vendor documentation, independent testing, and recovery-engineer review. If anything on this page looks inaccurate, outdated, or worth revisiting, please reach out at contact@datarecoveryfix.com and we’ll review it promptly.
