vmci.sys file report

MD5 49fb427f6abd2edea41d999dd1b70d2f
Latest seen 2023-04-16 23:52:26 (3 years ago)
First seen 2020-09-04 06:53:45 (5 years ago)
Size 114 KB
Publisher VMware, Inc.

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2020-09-04 06:53:45 (5 years ago); latest analysis 2023-04-16 23:52:26 (3 years ago).

Publisher context

Company metadata: VMware, Inc.. Product metadata: VMware PCI VMCI Bus Device.

Digital signature

Signed by VMware, Inc.;Microsoft Windows Hardware Compatibility Publisher. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

vmci.sys is a Windows file recorded in the ThreatInfo database. It is associated with VMware PCI VMCI Bus Device. The reported company name is VMware, Inc.. The current detection status is Undefined, based on the latest analysis from 2023-04-16 23:52:26 (3 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: VMware PCI VMCI Bus Device
Company Name: VMware, Inc.
MD5: 49fb427f6abd2edea41d999dd1b70d2f
Size: 114 KB
First Published: 2020-09-04 06:53:45 (5 years ago)
Latest Published: 2023-04-16 23:52:26 (3 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2023-04-16 23:52:26 (3 years ago)

The signature on vmci.sys is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%commonappdata%\reviversoft\driver reviver\downloads\73
%commonappdata%\reviversoft\driver reviver\unplugged drivers
%commonappdata%\reviversoft\driver reviver\downloads\3f678b9f-1b42-43f5-89ce-2fb8e60caccd
%commonappdata%\winzip\winzip driver updater\downloads\8fd67478-f99e-4680-87c5-c9c4fbc8085d
%commonappdata%\winzip\winzip driver updater\downloads\125
%commonappdata%\reviversoft\driver reviver\unplugged drivers
%commonappdata%\reviversoft\driver reviver\downloads\83
%commonappdata%\reviversoft\driver reviver\downloads\88294052-dbc8-45f3-8697-bfc671b1281e

ThreatInfo has observed vmci.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

37.5%
37.5%
25.0%

The strongest geographic signal for this file is China with 37.5% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for vmci.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

vmci.sys is identified as pe for 64 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000140000000
Entry Address: 0x00019000

PE Sections:

Name Size of data MD5
.text 62464 f95880158d64e97726d1c804136da65a
.rdata 7680 26561c4704b4f5f21ee1ea5ab466d913
.data 3072 92946aa8484bf02647436745d49f539e
.pdata 3584 76bc4c2b0f881e8f8b9ae2cfae0c3568
PAGE 7680 ee69f4fbd18b34356d37446a8765e85e
.edata 512 565cddb9a1935c4dd77e796bed5a0e04
INIT 4096 0fcd4f99368a24f3c7b1b3d005ad48f2
.rsrc 1536 5c038110fb1ab11a71a79e82dd8b554b
.reloc 512 f604fb0cf864af1ce47594f664e476cc

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: