WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Guide HWID Tracking — Technical Analysis of Windows Identifiers

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
271
Reaction score
7
Anyone currently dealing with persistent bans or trying to understand how anti-cheats track your hardware?

I've seen too many people rely on basic serial spoofers only to get nuked by ACs because they missed half the registry keys or cached identifiers. If you're building a spoofer or just trying to keep your rig clean, you need to understand the stack. Anti-cheats are moving far beyond just simple disk serials—they are scraping everything from ARP tables to USN journals.

Key Areas to Audit:
  1. Disk Serials: Hooking IOCTL_STORAGE_QUERY_PROPERTY and SMART_RCV_DRIVE_DATA is standard, but check your RaidPort mapping. Don't double-spoof if you're already hooking IRP_MJ_DEVICE_CONTROL.
  2. NIC MAC Address: Don't just rely on registry changes. Permanent MAC addresses are often cached in NDIS.sys. You might need to hook filter_block or manipulate the NDIS miniport global variables.
  3. Registry Gotchas: There's a massive amount of hidden telemetry. Clear your MountedDevices keys, check your EDID monitor data, and nuke your IDA history if you're doing dev work.
  4. Filesystem & Boot: ACs now pull from USN journal IDs and boot GUIDs via ZwQuerySystemInformation. A simple format won't cut it if you don't reset these.
  5. Network/ARP:** SendARP and GetIpNetTable2 are being used to log local network neighbors. If you have UPnP enabled, you might be leaking your own unique identifier.


  1. SMBIOS: Restart your Winmgmt service after spoofing, as WMI caches this data.
  2. NVMe Drives: Use NVME_PASS_THROUGH_SRB_IO_CODE instead of standard SATA IOCTLs.
  3. Files: Don't forget to scrub C:\Windows\System32\restore\MachineGuid.txt.

While others are catching manual bans from broken free YouTube injectors that get flagged in an hour, Infocheats users are actually understanding the surface area of their system. If your spoofing method doesn't account for these variables, you're essentially playing Russian roulette with your hardware profile.

Has anyone else found specific registry keys that triggered a shadowban recently?
 
Top