Please verify if the hyper-v feature is installed. If so, but you have no VMs, it could be that OS features that rely on virtualization based security are in use, that you are not aware of.
Please download and open process explorer from https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer and start it using right click and selecting "run as administrator". In its list, find and double click that vmmem and see if in its details on the tab "image" it says "Parent: vmwp.exe".
More: That check is meant to determine the legitimacy of the process. If you have no hyper-v installed, it shouldn't be there, after all, unless you are using related technologies.
Seems to be legitimate.
You would expect to see vmmem whenever a VM is running.
You should investigate what other non-default windows features are installed on your machine. Maybe "virtualization based security" is in effect - https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs
I am eager to know whether msinfo32 showed that " Virtualization-based security" was active, after all, James.
Are you running docker or Kubernetes in a virtual machine or something??
Also, if you go to services.msc, right click the service and find the location it's running from.
SC Query VMMem may find it also
If not let me know, you should be able to disable the service that runs it.