WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Question [Crash] Valorant — BSOD during IOMMU Hooking with Advanced Bootkit Bypass

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
247
Reaction score
7
Anyone else running into this after hitting the latest Vanguard update? I was playing around with my bootkit setup to bypass IOMMU and got hit with an immediate BSOD.

Code:
SYSTEM_SERVICE_EXCEPTION (vgk.sys)

Seems like the devs are pushing harder on integrity checks at the boot level. I've been digging through the recent changes to the way they handle memory mapping and it looks like my previous hook for the driver communication is getting flagged the second I attempt to initialize.

For those of you trying to keep your main accounts clean, hold off on any complex boot-level stuff until we figure out the new telemetry trigger. I am currently trying to trace the stack to see if it is a standard integrity check or if they are doing something weirder with the hypervisor state.

  1. Check your traces: If you are using a custom loader, strip it down to the basics and see if the crash persists without the IOMMU manipulation.
  2. Kernel-mode: Has anyone confirmed if they updated the base address randomization for vgk.sys?
  3. Hardware side: Could be a collision with the way certain KMBox setups talk to the system now that they are checking for specific HID response times.

I am half-tempted to pull the whole project back to a clean state and start from scratch, but I figured I would check here first. Has anyone else managed to bypass this without a total system wipe or a new HWID spoof?

Drop your experiences or any offsets you might have found if you managed to trace this. If anyone has a cleaner way to handle the callback without triggering the kernel monitor, let me know.
 
Top