Others E-Thots: A NTR Game Set in a 100% interactive PC Interface [Ch.2 v2.6] [Archipote]

4.00 star(s) 50 Votes

Huskiess

New Member
May 30, 2025
3
7
Just a heads-up to the dev — I checked the latest version of the game offline and found some weird stuff.
There’s a file sitting in the Temp folder (Crashpad-related) that already exists before the game crashes. Inside? It’s got a full Chrome-style autofill schema — name_on_card, expiration_month, guid, the whole thing. Doesn’t look like a legit crash log — more like it was pre-staged.

After a crash, I saw:
Registry edits to FeatureUsage\AppModel\SystemAppData, BLBeacon, and Control\BAM\UserSettings
Fake Chrome extension data, session tokens, and spoofed Preferences MACs in NW.js local storage (LevelDB / IndexedDB)

I used ProcMon, Wireshark, System Informer, and PEStudio during the analysis. No network activity happened since it was fully offline, but the behavior looks like it’s set to activate once a connection is available.

Also, PEStudio flagged multiple kernel-level calls and 5+ callbacks embedded in the executable — not typical for a regular game. Makes it look more like it's hooking into the system at a deeper level.

Could be a packaging issue or something hidden in the runtime — just thought you’d want to know. I’ve got logs, crash contents, registry diffs, and snapshots if you want to take a look.

Really good game and much love <3, but should only be ran in a VM until the dev fix this.
 
Last edited:

archipote

Active Member
Game Developer
Feb 13, 2021
568
1,546
Only one more update? :(
so much teasing, so much will she wont she
Yes like Orcobola2 said it's a chapter, last one took 6 updates for reference, so we still have plenty to discover hehe.

Just a heads-up to the dev — I checked the latest version of the game offline and found some weird stuff.
There’s a file sitting in the Temp folder (Crashpad-related) that already exists before the game crashes. Inside? It’s got a full Chrome-style autofill schema — name_on_card, expiration_month, guid, the whole thing. Doesn’t look like a legit crash log — more like it was pre-staged.

After a crash, I saw:
Registry edits to FeatureUsage\AppModel\SystemAppData, BLBeacon, and Control\BAM\UserSettings
Fake Chrome extension data, session tokens, and spoofed Preferences MACs in NW.js local storage (LevelDB / IndexedDB)

I used ProcMon, Wireshark, System Informer, and PEStudio during the analysis. No network activity happened since it was fully offline, but the behavior looks like it’s set to activate once a connection is available.

Also, PEStudio flagged multiple kernel-level calls and 5+ callbacks embedded in the executable — not typical for a regular game. Makes it look more like it's hooking into the system at a deeper level.

Could be a packaging issue or something hidden in the runtime — just thought you’d want to know. I’ve got logs, crash contents, registry diffs, and snapshots if you want to take a look.

Really good game and much love <3, but should only be ran in a VM until the dev fix this.
Hey, I have to admit that this isn't my area of expertise and I don't really understand what you've discovered. In any case, the game hasn't been altered in any way. I export it and upload it directly via Mega/Itch/Patreon.

However, I'm not the one posting the links on F95, but I doubt they've been altered there either.

If you don't mind, could you send me a private message telling me what I can do to check what you've discovered and potentially fix it if it is indeed abnormal behavior? Many thanks!
 

Huskiess

New Member
May 30, 2025
3
7
Yes like Orcobola2 said it's a chapter, last one took 6 updates for reference, so we still have plenty to discover hehe.


Hey, I have to admit that this isn't my area of expertise and I don't really understand what you've discovered. In any case, the game hasn't been altered in any way. I export it and upload it directly via Mega/Itch/Patreon.

However, I'm not the one posting the links on F95, but I doubt they've been altered there either.

If you don't mind, could you send me a private message telling me what I can do to check what you've discovered and potentially fix it if it is indeed abnormal behavior? Many thanks!
Can't really DM you not sure why, but i can guide you though each step if you want to add my discord numb1687
Unless there is another way you think is better i am down to help!
 
  • Heart
Reactions: archipote

JonasDimitry

Newbie
Apr 29, 2020
15
82
Just a heads-up to the dev — I checked the latest version of the game offline and found some weird stuff.
There’s a file sitting in the Temp folder (Crashpad-related) that already exists before the game crashes. Inside? It’s got a full Chrome-style autofill schema — name_on_card, expiration_month, guid, the whole thing. Doesn’t look like a legit crash log — more like it was pre-staged.

After a crash, I saw:
Registry edits to FeatureUsage\AppModel\SystemAppData, BLBeacon, and Control\BAM\UserSettings
Fake Chrome extension data, session tokens, and spoofed Preferences MACs in NW.js local storage (LevelDB / IndexedDB)

I used ProcMon, Wireshark, System Informer, and PEStudio during the analysis. No network activity happened since it was fully offline, but the behavior looks like it’s set to activate once a connection is available.

Also, PEStudio flagged multiple kernel-level calls and 5+ callbacks embedded in the executable — not typical for a regular game. Makes it look more like it's hooking into the system at a deeper level.

Could be a packaging issue or something hidden in the runtime — just thought you’d want to know. I’ve got logs, crash contents, registry diffs, and snapshots if you want to take a look.

Really good game and much love <3, but should only be ran in a VM until the dev fix this.
Hey, this looks like normal behavior for an NW.js game.

NW.js uses Chromium (like Chrome) to render the game, so stuff like Crashpad files, autofill schemas, registry edits, and Chrome-like data in local storage are standard. The kernel calls and callbacks are also typical for NW.js's system integration. Since you saw no network activity offline, it’s likely just dormant Chromium features. So this seems fine.

Great catch, though!
 
  • Heart
Reactions: archipote

Huskiess

New Member
May 30, 2025
3
7
Hey, this looks like normal behavior for an NW.js game.

NW.js uses Chromium (like Chrome) to render the game, so stuff like Crashpad files, autofill schemas, registry edits, and Chrome-like data in local storage are standard. The kernel calls and callbacks are also typical for NW.js's system integration. Since you saw no network activity offline, it’s likely just dormant Chromium features. So this seems fine.

Great catch, though!
Okay fair enough, I’ll ignore the whole Chrome credit card schema and session token fields staged before any crash. Sure.
But explain this:
  • Fresh VM snapshot? Silent.
  • Opened the game? Suddenly:
    • Starts blasting M-SEARCH SSDP packets across LAN
      (like it’s searching for smart TVs or nearby devices — what’s it trying to link with? My fridge?)
    • Pings google.com, fonts.googleapis.com, chrome.google.com, g.live.com
    • Sends ProductAgent probe packets with UUIDs
    • Fires off host discovery like “any [my username here]”
I’m not trying to start drama here — I actually like this game a lot, and the dev clearly put effort in.
So I’ll just be quiet now.
 

beastsumoda

Member
Sep 22, 2024
149
65
At some point in the story, a red dot will appear on your 'Stats' page (the purple graph icon). Open it and press "Upgrade Work" or whatever it says, I don't remember the exact wording. but you'll find it pretty easily!
it did once
i was talking about leveling up more to do more lewd things task etc
 

JonasDimitry

Newbie
Apr 29, 2020
15
82
Okay fair enough, I’ll ignore the whole Chrome credit card schema and session token fields staged before any crash. Sure.
But explain this:
  • Fresh VM snapshot? Silent.
  • Opened the game?Suddenly:
    • Starts blasting M-SEARCH SSDP packets across LAN
      (like it’s searching for smart TVs or nearby devices — what’s it trying to link with? My fridge?)
    • Pings google.com, fonts.googleapis.com, chrome.google.com, g.live.com
    • Sends ProductAgent probe packets with UUIDs
    • Fires off host discovery like “any [my username here]”
I’m not trying to start drama here — I actually like this game a lot, and the dev clearly put effort in.
So I’ll just be quiet now.
1. Starts blasting M-SEARCH SSDP packets across LAN
Like you said, M-SEARCH SSDP packets are used to identify UPnP-supported devices (e.g., Chromecast).
If you open the game and press Ctrl+Shift+I, you'll see the developer console of the Chromium browser.
Go to the Application tab and check the loaded scripts you'll see the following.
cast_sender.js
1749018590492.png

This script is responsible for those SSDP packets, and it is included in Construct 3 games by default. There's nothing malicious going on.

2. Pings google.com, fonts.googleapis.com, chrome.google.com, g.live.com

  • google.com: Chromium connects to google.com on startup to check the preferred Google domain via a request to a search domain check URL, ensuring proper configuration

    . This is inherited by NW.js applications. ( )
  • fonts.googleapis.com: Many web applications, including those built with NW.js, fetch fonts from Google’s font service to render UI elements, a common practice in web-based games.
  • chrome.google.com: This could be related to checking for extensions or updates, as NW.js supports Chrome extension-like functionality, though it’s less common in standalone games.
  • g.live.com: This is less clear but may relate to Microsoft services.
3. Sends ProductAgent probe packets with UUIDs
Mostly, probe packets are used to test network connectivity and gather information about a system. However, I don't have an explanation for the 'ProductAgent' packets. I believe they are associated with Bitdefender antivirus. So, if you have Bitdefender installed on your computer, the packets might be originating from the antivirus. If not, then this behavior is not normal.

4. Fires off host discovery like “any [my username here]”
This one is quite suspicious if the packets originate from the game, or they might be coming from installed Windows system apps, which is completely safe.
 

Yuga12

New Member
Jan 24, 2025
4
0
I wonder when this game can be accessed by Android or the Joiplay emulator, but if there is an Android emulator that is suitable for this game, please let me know.
 
4.00 star(s) 50 Votes