WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
297
Reaction score
7
Anyone currently looking into ARC Raiders? Had to deal with Theia anti-tamper recently, and it's definitely not your average VMProtect paste.

Theia uses aggressive page-level encryption, marking the entire ~243MB binary as PAGE_NOACCESS. It patches KiUserExceptionDispatcher to intercept every access violation, decrypting on the fly. Standard dumping tools get completely nuked here because the pages re-encrypt instantly.

The Technical Breakdown

  1. Theia maps an invisible runtime.dll that isn't present in any standard PEB module list.
  2. It uses 7 layers of exception handling inside that DLL.
  3. It employs a 3-copy mapping strategy (on-disk image, heap copy, and high-VA active instance), and you have to hook all of them.
  4. It monitors VirtualProtect and has its own integrity timer threads that will freeze your threads via NtSuspendThread if they catch a JMP hook.

The Bypass Strategy

The key is that the game must execute its code eventually. I built a direct syscall engine to bypass monitoring, then suspended all game threads to kill the integrity checker. By synthesizing artificial STATUS_ACCESS_VIOLATION execute faults with a perfectly crafted CONTEXT (Rip pointing to the game page), Theia thinks it's a legitimate decrypt request. It does the heavy lifting for you, decrypts the page, and you just swipe the data.

  1. Find the 3 hidden copies of runtime.dll.
  2. Sig-scan for the decrypt handler (Look for E8 ?? ?? ?? ?? 83 F8 ?? 76).
  3. Suspend all ~200 game threads to stop the integrity timer.
  4. Install JMP hooks via direct syscall NtProtectVirtualMemory.
  5. Loop through protected pages, synthesize faults, and copy decrypted results.
  6. Cleanup and resume.

A note on risks: This isn't for main accounts. The integrity checker is cycle-based (total ~106 seconds), but if you freeze the threads, you avoid the kill-flag window entirely.

Has anyone else messed with theia-protected builds? Curious if others found a way to resolve those obfuscated syscall numbers without constant pattern scanning.
 
Top