VMware ESXi, vSphere & Hyper-V Data Recovery
ESXi 6.x/7.x/8.x, vSAN, Hyper-V 2016/2019/2022, Proxmox VE, XenServer — virtual machine recovery
ESXi 6.x/7.x/8.x, vSAN, Hyper-V 2016/2019/2022, Proxmox VE, XenServer — virtual machine recovery
| Platform | Versions | Filesystem | Virtual disk formats |
|---|---|---|---|
| VMware ESXi / vSphere | 6.5, 6.7, 7.0, 8.0 | VMFS 5 / VMFS 6 | VMDK flat, sparse, sesparse, thin/thick provisioned |
| VMware vSAN | 6.7+, 7.0, 8.0 | VSAN on-disk (proprietary) | vSAN objects (component, witness), disk groups (cache + capacity) |
| Microsoft Hyper-V | 2016, 2019, 2022 | NTFS / ReFS / CSV | VHD (legacy), VHDX (dynamic/fixed/differencing) |
| Proxmox VE | 7.x, 8.x | ZFS / LVM / Ceph | QCOW2, raw disk images, ZFS zvols, LVM volumes |
| Citrix XenServer / XCP-ng | 7.x, 8.x | EXT3 / LVM | VHD (on LVM in Storage Repository) |
VMFS (Virtual Machine File System) is VMware's proprietary file system for ESXi datastores. A power cut, RAID controller failure or firmware error can corrupt VMFS metadata, leaving the datastore inaccessible. VMDKs may be intact at the block level even though VMFS cannot list them.
Deleting a flat VMDK (the VM's data file) from the datastore browser or via SSH does not immediately erase the data: it marks the space as free in VMFS. If that space has not been written over, recovery is viable by analysing VMFS internal structures to locate the deleted file's extents.
VMware snapshots create delta files (-delta.vmdk or -sesparse.vmdk) that record changes since the snapshot. A failed consolidation (merging the delta with the base disk) can leave the snapshot chain broken: the base disk and deltas become inconsistent. The VM does not boot and vCenter shows «Needs consolidation» without being able to complete it.
The datastore appears as «inactive» or «inaccessible» in vCenter/ESXi. Can be caused by underlying RAID failure, GPT partition table corruption, SAN LUN loss (path failure) or VMFS-L (locking layer) metadata corruption. VM data remains on the physical disks.
ESXi stores its boot image on a small partition (USB, SD card or local disk). If ESXi won't boot (Purple Screen of Death, bootbank corruption), the VMFS datastores on the data disks remain intact. Reinstalling ESXi on new media and re-presenting the datastores usually restores access, but requires care to avoid reformatting.
vSAN distributes VM objects across disk groups on multiple hosts. A disk group failure (damaged SSD cache disk, failed capacity disk) can leave objects «absent» or «degraded». If the FTT (Failures to Tolerate) policy is exceeded, the VM becomes inaccessible. Reconstruction requires direct access to each host's disks.
Hyper-V VHDX disks can become corrupted by power cut during write operations, CSV (Cluster Shared Volumes) failure in a cluster, or an error during a checkpoint (Hyper-V snapshot). The VM won't boot and shows an error mounting the VHDX. Repairing the VHDX structure and extracting data from the internal filesystem (NTFS/ReFS) is feasible.
Ransomware groups (Royal, BlackCat, LockBit) attack ESXi directly via SSH or known vulnerabilities (CVE-2021-21974 OpenSLP). They encrypt all VM VMDKs. Recovery depends on whether encryption completed, whether prior snapshots exist in the datastore and whether the underlying RAID has residual data.
⚠ Mistakes that turn a recoverable situation into irrecoverable:
vmkfstools to «repair» a VMDK without understanding exactly what you are doing. vmkfstools -x repair can overwrite critical VMDK descriptor metadata.Bit-for-bit image of each server disk (SAS, SATA, NVMe) with DeepSpar Disk Imager. If storage is a SAN, we extract the disks from the enclosure. If local storage, we clone directly. We never work on original disks.
If the server uses hardware or software RAID, we virtually reconstruct the array on the cloned images. We determine the geometry (stripe size, parity, order) from controller metadata or pattern analysis.
Mounting the VMFS volume (ESXi), NTFS/ReFS/CSV (Hyper-V) or ZFS/LVM (Proxmox) on the reconstructed array. Locating VMDK/VHDX/QCOW2 files and verifying snapshot chain integrity if applicable.
Mounting the VMDK/VHDX as a virtual disk to access the VM's internal filesystem (NTFS, EXT4, XFS). Extraction of files, databases, configurations. If the VM is not mountable, we perform block-level carving within the virtual disk.
Data delivered on an external drive or, if required, as a functional VMDK/VHDX ready to import into a new hypervisor. Detailed technical report with checksums. You only pay if we recover your data.
Three options tailored to your urgency and budget
| Scenario | Description | Timeframe | Price |
|---|---|---|---|
| Logical VMDK/VHDX | Corrupt or deleted virtual disk, accessible datastore, no physical disk damage | 4–12 days | €800–1,500 |
| Corrupt VMFS + RAID | Inaccessible VMFS datastore on degraded or failed RAID. RAID + VMFS reconstruction. | 7–15 days | €1,500–3,500 |
| vSAN / distributed storage | Disk group failure, absent/degraded vSAN objects, Proxmox/Ceph cluster with failed OSDs. | 10–20 days | €2,000–5,000 |
| Physical disk damage (+) | Cleanroom intervention for SAS/SATA/NVMe disks with mechanical damage. | +4–12 days | +€600–1,200/disk |
| Emergency | Top priority, extended business days including weekends. | 24–72h | +50% |
Yes, if the space has not been reused. VMFS does not immediately overwrite freed space. We analyse VMFS internal structures (resource bitmap, file descriptors) to locate the deleted VMDK's extents and reconstruct the file. The sooner you act, the better: do not create new VMs or write data to the same datastore.
VMware snapshots create delta files that store only changes relative to the base disk. Consolidation (merge) integrates those changes into the base disk and removes the deltas. It can fail due to: insufficient datastore space, file locked by another process, inconsistency in the snapshot-descriptor chain, or interruption during the merge. A failed consolidation leaves the VM with orphaned snapshots preventing boot.
If ESXi booted from USB/SD and the boot media has failed, the VMFS datastores on local disks are intact. You can install ESXi on a new USB/SD and re-present existing datastores (esxcli storage filesystem rescan). Important: during installation, DO NOT select the data LUNs as the installation target. If you are unsure, contact us before touching anything.
Yes. We can deliver data as extracted files on an external drive or as a functional VMDK/VHDX ready to import into ESXi, Hyper-V, Proxmox or any other hypervisor. If the original VM contained a SQL Server database or Exchange mail server, we can also extract those specific data if you don't need the complete VM.
Yes. Proxmox VE can use ZFS (local or mirror), LVM-thin, Ceph (distributed) or NFS/iSCSI. For ZFS, we reconstruct the pool from the member disks (vdevs). For Ceph, we need access to the cluster's OSDs. Virtual disks in Proxmox (QCOW2 or raw on zvol) are mountable once the underlying storage is reconstructed.
Cloning: 2-4 days if disks are healthy (more if there is physical damage). RAID reconstruction: 4-12 hours to determine geometry + generate the virtual volume. VMFS analysis + extraction: 1-3 days depending on the number and size of VMs. Typical total: 7-12 business days. Emergency service: 3-5 days.
Ransomwares targeting ESXi (Royal, BlackCat, ESXiArgs) encrypt VMDKs directly from the ESXi SSH shell. If encryption was partial (interrupted or only the first sections of the file), we can recover data from the unencrypted sections of the VMDK. If snapshots existed prior to the attack in the datastore, they may contain a clean version of the data. We also analyse the underlying RAID for residual data.
Urgent collection across Spain. Free 4-hour diagnosis. Laboratory operational including weekends.
Do not reformat datastores, do not consolidate snapshots, do not reinstall over the data.
Free collection* within 24h · 4-hour diagnosis · No recovery, no fee
Practical guides, news and tips to protect your data. No spam.
Stay updated