Information about vm3dmp_loader.sys

vm3dmp_loader.sys

vm3dmp_loader.sys is a Windows file recorded in the ThreatInfo database. It is associated with VMware SVGA 3D. The reported company name is VMware, Inc.. The current detection status is Undefined, based on the latest analysis from 2023-04-16 23:49:26 (3 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: VMware SVGA 3D
Company Name: VMware, Inc.
MD5: 73cb135c30a28373dde943548efeeaca
Size: 44 KB
First Published: 2023-04-16 23:49:26 (3 years ago)
Latest Published: 2023-04-16 23:49:26 (3 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2023-04-16 23:49:26 (3 years ago)

The signature on vm3dmp_loader.sys is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%commonappdata%\reviversoft\driver reviver\unplugged drivers

ThreatInfo has observed vm3dmp_loader.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Egypt with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for vm3dmp_loader.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

vm3dmp_loader.sys is identified as pe for 64 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000140000000
Entry Address: 0x000074d0

PE Sections:

Name Size of data MD5
.text 8192 bc19b9445d4cfd3e7120e7f8e6868d50
.rdata 2560 b0dbc13035fe242daa7536cf3517e333
.data 2560 93dd8f381e9f3a34a491650996375d6e
.pdata 1024 98eaae6f1d978fc94d9fe610c0a6e959
PAGE 512 0730efa213fad068165f67dae6babeb0
INIT 3072 0b932a08ae3a4762f110274a7aca43b0
.rsrc 1024 64d24fcd779034ad5dbb3567485a36de
.reloc 512 efe62cbfbc649c5d211c77412409b670

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: