in progress...

Brak wpisów, ale nie martw się, poinformujemy Cię, gdy tylko pojawi się nowa oferta.

Create Alert Create deal Alert

O [ Content Deleted ]

[ Content Deleted ] - o grze

About This Game

Your own computer is compromised. Can you uncover the truth before it consumes you?

[ Content Deleted ] is a unique horror game that blurs the lines between fiction and reality, placing the source of terror directly onto characters own PC. What begins as a routine Browse session takes a sinister turn when you discover corrupted files, strange anomalies, and a hidden operating system lurking within your seemingly familiar machine.

Gameplay & Features

In [ Content Deleted ], your primary objective is to investigate and survive. You'll delve into a deeply interactive digital environment that mimics a real computer desktop, complete with a custom operating system, file directories, and applications. Your goals include:

  • Digital Forensics: Sift through a vast network of corrupted files, cryptic documents, unsettling audio logs, and fragmented video clips. Each piece of data you uncover brings you closer to understanding the malevolent entity that has infiltrated your system.

  • Puzzle Solving: Decipher encrypted messages, bypass digital locks, and solve logic puzzles to access deeper levels of the compromised network. These challenges are seamlessly integrated into the computer interface, requiring you to think like a digital detective.

  • Meta-Horror Mechanics: Experience a constant sense of dread as horror extends beyond the game window. The entity will subtly manipulate your actual desktop, displaying chilling messages, flickering your screen, or even playing sounds that seem to come from outside the game. These unexpected intrusions heighten the paranoia and make the threat feel incredibly real.

  • Narrative Progression: The non-linear story unfolds as you uncover more information. Every discovery impacts on your understanding of the entity's origins, its capabilities, and its goal. Your progression is tied directly to the data you collect and the secrets you unlock.

  • Dynamic Threats: Be prepared for unexpected events. The entity may actively try to obstruct your investigation by corrupting files you're viewing, locking you out of folders, or even forcing applications to crash. You'll need to react quickly and find workarounds to continue your search.

  • Multiple Endings: The choices you make and the level of information you uncover will influence the outcome. Can you banish the entity, or will you succumb to its digital grasp? Unraveling the full story and finding your way to a definitive conclusion will require thorough exploration and keen observation.

The Challenge

[ Content Deleted ] challenges your resolve and your perception of reality. You'll face the psychological toll of a digital invasion, where your personal computer becomes a conduit for fear. The game offers a chilling, atmospheric experience designed to keep you on edge as you confront the unsettling truth lurking on your own machine.