tyDon't download mods for 0.56 version
Utilize ` key; it explains that can be done using right click on upper arm.
tyDon't download mods for 0.56 version
Utilize ` key; it explains that can be done using right click on upper arm.
DO NOT RUN THIS GAME
UNTIL THE DEVELOPER / OP CAN EXPLAIN THESE DETECTIONS, AND FILE OPERATIONS.
You must be registered to see the links
You must be registered to see the links
Both do the same, both have different anti virus results.
The virus one, injects into C:\Program Files (x86)\Google1608_1329478733\bin\updater.exe
View attachment 3764914
Does this really look like something this forum shouldn't look into?
Do I need to manually reverse engineer this executable to prove the developer (OR ORIGINAL POSTER !! ! ) is doing something fishy.
View attachment 3764915
Related parents, aka shared file hashes. Why is it affiliated with keygens, and random zips???
It establishes connections to multiple external IP addresses. These connections are potentially command-and-control (C2) servers, indicating the malware's attempt to communicate with an external source for instructions or data exfiltration.
Spawns new processes and services, indicating the execution of its payload and attempts to maintain control over the infected system.
It modifies registry entries in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run to ensure it runs every time the system starts.
Changes in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services to manipulate system services, often to disable security-related services or to create new malicious services.
Modifies the key HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE, potentially to affect browser behavior and user credential handling.
View attachment 3764941 View attachment 3764942
The malware creates numerous .tmp files in the user's temporary directory (AppData\Local\Temp). These files are likely used as intermediate stages in the malware's execution process.
The malware uses cmd.exe to execute batch files (.bat) located in the temporary directory. These batch files are used to execute the primary malicious payload.
The malware masquerades as the Google updater to blend in with legitimate processes. This is indicated by paths like C:\Program Files (x86)\Google\Update\.
By creating and executing multiple batch files, the malware ensures persistence and continuous execution, making it harder to remove.
I don't know how you can have 10 fps on 4060 if my friend has 60 fps on 4070 stable with 3-4 players.Anyone got a working clean link for 0.42 that doesn't come with a virus? I'm trying to run the latest version and getting 10 FPS on a 4060. This new version is outright Unity slander. It's rendering at less than quarter resolution and upscales to your resolution. It's hilariously bad. Like worse than yandere dev levels bad. Honestly, if the dev slipped in an Ethereum miner, I doubt anyone would notice or care.
No wonder people think every Unity game is an asset flip held together with duct tape that runs like dogshit.
I don't know how you can have 10 fps on 4060 if my friend has 60 fps on 4070 stable with 3-4 players.
What Cpu?Interesting. You'll have to ask the developer why the game performs like this on modern hardware. I'm running a 4060 at 4K and it's struggling to maintain double-digit frames.
Could be the aggressive upscaling. Could be whatever post-processing pipeline they duct-taped in at the last minute. Or maybe it's the Ethereum miner quietly benchmarking my system in the background. Hard to say.
But if your friend's getting 60 FPS on a 4070, he should consider himself lucky. You should probably tell him to try running the game with something better than a 800x600 CRT monitor. Most people I've talked to are getting performance somewhere between a screensaver and a slideshow.
thanks alot it worksFREEMODE HG.
Go to the op which has a link to the mods here in this thread.
When you have it PROPERLY installed, click on a character.
If you downloaded all the mods, choose the option that says FREEMODE HG and go to illegal customization, choose the preferred male character to make a bottom (meaning able to do gay stuff).
Ryzen 7 7700X. Eight cores, plenty of headroom. Not exactly vintage hardware.What Cpu?
cuz you and the guy with the 4070 seem to be seriously Cpu bottlenecked..
Not saying the game is running fine, infact lost around 15% fps with the new update, but it still runs smoothly.
one of there team sorted my black screen today so they now know how to fix it on AMD rigs, so a fix/patch should come out very soonThrowing my voice in with those who has the black screen and then the force crash out. Any ideas ona fix?
Thanks, fingers crossed it helps. I am running Intel iRIS xe however so I am crossing my fingersone of there team sorted my black screen today so they now know how to fix it on AMD rigs, so a fix/patch should come out very soon
I agree, but something doesn't add up...Ryzen 7 7700X. Eight cores, plenty of headroom. Not exactly vintage hardware.
So now I'm concerned since I ran the program numerous times throughout the past few days, what do I do now? Is there a way to purge my computer of these files? Or as I understood are they gone after the game launches as they already stole everything? I uninstalled truefacials.exe but I know that's obviously not the end of it. I'm currently deep scanning with malwarebytes and about to reset my passwords on everything. Is a factory reset needed? I'd really rather not deal with that mess of backing everything up and reinstalling all my games and shit. any help would be appreciated brother.DO NOT RUN THIS GAME THROUGH TrueFacials.exe IT CONTAINS AN INFO STEALING MALWARE / VIRUS
The genuine executable for the game is bin.exe, while the fake TrueFacials.exe is a malicious file intentionally renamed to appear legitimate and trick users into running it. In reality, it is an info-stealing malware that extracts and executes a batch script in your temporary folder with elevated permissions, patches your default browser with a fake updater (updater.exe), and steals sensitive personal data.
This malware was first seen in the wild on 2021-08-27 13:21:44 UTC, and remains active in the distributed build. If you ran it and your antivirus did not block the payload, assume your information has been compromised.
I personally tested the executable in an isolated virtual machine to verify the earlier analysis by user poopybutt77 and can confirm with 100% certainty that it is an info stealer.
Do not try to reproduce this on a real host machine, only test in an isolated VM or sandbox. Run it on your main system and you'll get your shit rocked and your data looted.
Key evidence I observed inside an isolated VM
- Two files observed:
You must be registered to see the links(legitimate Unity executable) andYou must be registered to see the links(malicious impersonator).- Malicious behavior reproduced in a VM: extraction of a .bat into the temporary folder and execution via cmd.exe.
- The malware attempts to download / place updater.exe in a path that impersonates a browser updater (e.g. C:\Program Files (x86)\Google...\updater.exe) and launch it.
- Registry modifications observed targeting persistence and service manipulation:
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run (adds startup entry).
- HKLM\SYSTEM\CurrentControlSet\Services (modifies/creates service entries).
- HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE (modified).
- etc... all files created and accessed can be seen at the
You must be registered to see the links- Network activity: connections to numerous external IPs consistent with C2 behavior.
- Spawns additional processes/services and creates multiple .tmp files and batch scripts in %LOCALAPPDATA%\Temp.
- Associated file hashes/parents noted in analysis indicate affiliation with keygens and random archives (IOCs that increase suspicion).
- Earliest seen timestamp in the wild (per the provided analysis): 2021-08-27 13:21:44 UTC indicates this malicious build has been available for years.
Sample batch content observed (exact snippet reproduced from legit TrueFacials.bat launcher):
Echo off
cd ntleas\x64
ntleas.exe ../../bin.exe "L1041"
cls
This is what the legitimate launcher should do. Instead, TrueFacials.exe extracts and runs a malicious batch that patches the browser and runs updater.exe
Why “false positive” claims are wrong
- This is not a heuristic alert with no side effects. The binary actively modifies registry keys, creates & executes batch files, spawns processes/services, and downloads/places a payload that impersonates a browser updater. Those are explicit malicious behaviors, not a heuristics mistake.
- Behavior reproducible in an isolated VM.
Here is a video of the analysis with a guide on how to verify it yourself.
View attachment 5363357
Original analysis by:
DO NOT RUN THIS GAME THROUGH TrueFacials.exe IT CONTAINS AN INFO STEALING MALWARE / VIRUS
The genuine executable for the game is bin.exe, while the fake TrueFacials.exe is a malicious file intentionally renamed to appear legitimate and trick users into running it. In reality, it is an info-stealing malware that extracts and executes a batch script in your temporary folder with elevated permissions, patches your default browser with a fake updater (updater.exe), and steals sensitive personal data.
This malware was first seen in the wild on 2021-08-27 13:21:44 UTC, and remains active in the distributed build. If you ran it and your antivirus did not block the payload, assume your information has been compromised.
I personally tested the executable in an isolated virtual machine to verify the earlier analysis by user poopybutt77 and can confirm with 100% certainty that it is an info stealer.
Do not try to reproduce this on a real host machine, only test in an isolated VM or sandbox. Run it on your main system and you'll get your shit rocked and your data looted.
Key evidence I observed inside an isolated VM
- Two files observed:
You must be registered to see the links(legitimate Unity executable) andYou must be registered to see the links(malicious impersonator).- Malicious behavior reproduced in a VM: extraction of a .bat into the temporary folder and execution via cmd.exe.
- The malware attempts to download / place updater.exe in a path that impersonates a browser updater (e.g. C:\Program Files (x86)\Google...\updater.exe) and launch it.
- Registry modifications observed targeting persistence and service manipulation:
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run (adds startup entry).
- HKLM\SYSTEM\CurrentControlSet\Services (modifies/creates service entries).
- HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE (modified).
- etc... all files created and accessed can be seen at the
You must be registered to see the links- Network activity: connections to numerous external IPs consistent with C2 behavior.
- Spawns additional processes/services and creates multiple .tmp files and batch scripts in %LOCALAPPDATA%\Temp.
- Associated file hashes/parents noted in analysis indicate affiliation with keygens and random archives (IOCs that increase suspicion).
- Earliest seen timestamp in the wild (per the provided analysis): 2021-08-27 13:21:44 UTC indicates this malicious build has been available for years.
Sample batch content observed (exact snippet reproduced from legit TrueFacials.bat launcher):
Echo off
cd ntleas\x64
ntleas.exe ../../bin.exe "L1041"
cls
This is what the legitimate launcher should do. Instead, TrueFacials.exe extracts and runs a malicious batch that patches the browser and runs updater.exe
Why “false positive” claims are wrong
- This is not a heuristic alert with no side effects. The binary actively modifies registry keys, creates & executes batch files, spawns processes/services, and downloads/places a payload that impersonates a browser updater. Those are explicit malicious behaviors, not a heuristics mistake.
- Behavior reproducible in an isolated VM.
Here is a video of the analysis with a guide on how to verify it yourself.
View attachment 5363357
Original analysis by:
quoting for posterity, this discussion is as old as the game.As someone with no life, I'll be happy to explain the gist of it to you: See, in v0.4, there was quite an overhaul on how the game works internally, and the changes in the code, for some reason, would make it so Unity would refuse to run it unless it thinks your computer's region is Japanese, or simply Asian, whatever. A workaround found was running the game through something called NTLEAS, which I understand is like a region emulator?
Anyways, the current version, v0.41, includes NTLEAS in it, and the TrueFacials.exe is actually something the dev included as a shortcut to run the ACTUAL executable, which is named bin.exe, through the NTLEAS included. And it's the shortcut .exe that is setting off the false positives. Fun fact, it's not even really an .exe, its a .bat the dev converted into .exe because he was worried people wouldn't know they need to click it.
TL;DR as far as i've seen, the TrueFacials.exe is completely safe, but if you're worried, you can get rid of it if you want. You'll likely have to go run the bin.exe through the NTLEAS thing, though.
Okey, I don´t usually post answers to posts like this but after reading and testing (more times than i would like to admit) i´ll give my two cents. I have downloaded TF several times from this site and a different one and only once have i had problems with the .exe. Granted the only time i had an incident it was from a 0.5 version that was posted here and i posted what i found and how i noticed the .exe had been tampered with. That specific version was uploaded by an user that left this site after that issue gained traction.DO NOT RUN THIS GAME THROUGH TrueFacials.exe IT CONTAINS AN INFO STEALING MALWARE / VIRUS
The genuine executable for the game is bin.exe, while the fake TrueFacials.exe is a malicious file intentionally renamed to appear legitimate and trick users into running it. In reality, it is an info-stealing malware that extracts and executes a batch script in your temporary folder with elevated permissions, patches your default browser with a fake updater (updater.exe), and steals sensitive personal data.
This malware was first seen in the wild on 2021-08-27 13:21:44 UTC, and remains active in the distributed build. If you ran it and your antivirus did not block the payload, assume your information has been compromised.
I personally tested the executable in an isolated virtual machine to verify the earlier analysis by user poopybutt77 and can confirm with 100% certainty that it is an info stealer.
Do not try to reproduce this on a real host machine, only test in an isolated VM or sandbox. Run it on your main system and you'll get your shit rocked and your data looted.
Key evidence I observed inside an isolated VM
- Two files observed:
You must be registered to see the links(legitimate Unity executable) andYou must be registered to see the links(malicious impersonator).- Malicious behavior reproduced in a VM: extraction of a .bat into the temporary folder and execution via cmd.exe.
- The malware attempts to download / place updater.exe in a path that impersonates a browser updater (e.g. C:\Program Files (x86)\Google...\updater.exe) and launch it.
- Registry modifications observed targeting persistence and service manipulation:
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run (adds startup entry).
- HKLM\SYSTEM\CurrentControlSet\Services (modifies/creates service entries).
- HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE (modified).
- etc... all files created and accessed can be seen at the
You must be registered to see the links- Network activity: connections to numerous external IPs consistent with C2 behavior.
- Spawns additional processes/services and creates multiple .tmp files and batch scripts in %LOCALAPPDATA%\Temp.
- Associated file hashes/parents noted in analysis indicate affiliation with keygens and random archives (IOCs that increase suspicion).
- Earliest seen timestamp in the wild (per the provided analysis): 2021-08-27 13:21:44 UTC indicates this malicious build has been available for years.
Sample batch content observed (exact snippet reproduced from legit TrueFacials.bat launcher):
Echo off
cd ntleas\x64
ntleas.exe ../../bin.exe "L1041"
cls
This is what the legitimate launcher should do. Instead, TrueFacials.exe extracts and runs a malicious batch that patches the browser and runs updater.exe
Why “false positive” claims are wrong
- This is not a heuristic alert with no side effects. The binary actively modifies registry keys, creates & executes batch files, spawns processes/services, and downloads/places a payload that impersonates a browser updater. Those are explicit malicious behaviors, not a heuristics mistake.
- Behavior reproducible in an isolated VM.
Here is a video of the analysis with a guide on how to verify it yourself.
View attachment 5363357
Original analysis by: