WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Discuss ARC Raiders — Persistent Shadow Bans on Ryzen 9000 + DMA

byte_corvus

Newbie
Newbie
Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
546
Reaction score
7
Anyone else hitting a brick wall with shadow bans in ARC Raiders? I've been digging into the telemetry after a persistent loop of 30-day suspensions on a high-end Ryzen 9000 build, and things aren't adding up.

Even with a dedicated hardware setup and supposed "safe" DMA configs, EAC seems to be flagging specific identifiers or behavioral patterns that shouldn't be visible.

- CPU: Ryzen 7 9800X3D
- Motherboard: MSI MAG B850 Tomahawk Max WiFi
- BIOS Settings: SVM Disabled, IOMMU Disabled, Above 4G Decoding Enabled, Secure Boot Nulled
- OS: Clean ISO, Core Isolation/VBS OFF, zero third-party overlays

The Shadow Symptoms
Testing reveals a specific pattern: after 1-5 raids, the account gets tagged. You’ll notice empty lobbies, matchmaking with only bots or other flagged users, and the loot tables being absolutely gutted. Eventually, the 30-day suspension hits.

Code:
Status: Shadow/Temp Ban
Duration: 30 Days
Indicators: Empty raids, matchmaking delays, loot sparsity

DMA setup vs. Internals
What's interesting is the comparison to users running standard internal/external pastes like Crooked Arms. While the DMA setup using Eden firmware and KMBOX is being carefully tuned (low FOV, curved aim paths, smoothing up to 80), ragers on older AMD architecture are flying under the radar for weeks.

  1. Is EAC specifically targeting memory access patterns on the Zen 5 architecture?
  2. Is the DMA firmware signature leaked or being heuristically flagged by the latest anti-cheat update?
  3. Are the HWID identifiers (Disk, NIC, Motherboard) being tracked via deep seed registries that standard spoofers are missing?

I’ve tried switching from Intel to AMD just to dodge the flag, but even without the DMA card active, the shadow status persists after a few raids on fresh accounts. This suggests a very deep hardware-level trace or an IP/Behavioral flag that sticks despite VPNs and MAC changes.

Anyone else on a fresh Ryzen build getting clapped instantly, or have you found a way to sanitize the hardware traces properly for ARC Raiders?

Drop your bios offsets or serial cleaning methods below.
 
Top