You can decrypt or re-encrypt an encrypted core dump on your ESXi host by using the crypto-util CLI.
You can decrypt and examine the core dumps in the vm-support package yourself. Core dumps might contain sensitive information. Follow your organization's security and privacy policy to protect sensitive information, such as host keys.
For details about re-encrypting a core dump and other features of
crypto-util, see the command-line help.
Note:
crypto-util is for advanced users.
Prerequisites
The ESXi host key that was used to encrypt the core dump must be available on the ESXi host that generated the core dump.