WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Question [Crash] ARC Raiders — Theia Anti-Tamper Triggering Internal Render Hook Crash

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
142
Reaction score
7
Been messing around with internal hooks lately and hit a wall with ARC Raiders.

I managed to get the DX12 render hook running smooth, but I'm consistently running into the THEIA crash. It triggers regardless of whether I'm hitting the render thread or just performing basic memory reads. It doesn't seem to be a standard signature detection or a ban wave trigger, as the account remains untouched, but it definitely feels like some form of anti-tamper or memory integrity check kicking in.

Has anyone encountered this specific crash when hooking ARC? I'm trying to figure out if it's a pointer validation issue or if their anti-tamper is flagging the hook entry point during repetitive access.

  1. Environment: DX12 hook using standard ImGui overlay.
  2. The Issue: Instant THEIA crash on repetitive memory calls or frame injection.
  3. Current Status: Account is UD, so it's likely a protection/integrity trap rather than a server-side ban.

I'm relatively new to the internal scene, so I'm curious if the devs are using a custom exception handler to catch illegal memory access or if there's a specific routine I need to bypass to keep the hook persistent.

If anyone has experience with this engine or has successfully bypassed this check, drop some wisdom. Are you guys hooking the swapchain or going for something deeper? Any tips on masking the hook or handling these repetitive reads would be massive.
 
Top