780 posts

ᅟ banner
ᅟ

@vegowski

🇵🇱 | exceptional ragebaiter

Sandy Steppes, Placid Paddies Katılım Ekim 2021
484 Takip Edilen36 Takipçiler
Sabitlenmiş Tweet
ᅟ
@vegowski·
good credit 🔫🔫
English
4
2
5
1.4K
ᅟ
@vegowski·
@sugarfnatic nwm jak sie to robi ale wierze ze dasz rade
Polski
0
0
0
172
ᅟ
@vegowski·
14 yr old rad :P
ᅟ tweet media
English
0
0
0
9
ᅟ
@vegowski·
@fyrrttv this is why u got banned (this and wintrading)
English
0
0
2
380
ᅟ
@vegowski·
@ytlyts whyd u delete that tweet boi
English
0
0
0
9
ᅟ
@vegowski·
Retiring from professional @FNCompetitive. Thanks to everyone who supported me. I will never forget the grands I won. 😢
English
1
0
0
28
ᅟ
@vegowski·
@claasic_CS2 *ABSOLUTE DOGSHIT WAS AN OPTION BUT YOU WANT UNFINISHED GARBAGE
English
0
0
1
15
vx-underground
vx-underground@vxunderground·
Yeah, so pretty much this cpuid.com malware is a pain in the ass. I'd have to spend a good bit of time trying to bonk it with a stick and reconstruct some of it. Whoever developed this malware actually cares about evasion and made some intelligent decisions when developing this malware payload. This appears to only impact HWMonitor 64bit. It appears (based on user reports) cpuid became malicious around 7PM EST, April 10th, 2026. However, it is possible it was much earlier than this, this is just when people began noticing and discussing it online. From an extremely high-level overview, it appears the ultimate goal of this malware is data theft, specifically browser credentials. However, I could be wrong in that assessment, but I'm fairly confident in it. I'm guessing this is the end goal because when I emulated it I can see it messing with Google Chrome's IElevation COM interface (trying to dump and decrypt saved passwords). However, between this it does a bunch of other stuff too. 1. They (an unknown Threat Actor) compromised cpuid.com to deliver malware from HWMonitor. It impacts the actual installer as well as the portable installer. It downloads stuff from supp0v3-dot-com, the same domain used from a previous malware campaign targeting FileZilla in the beginning of March, 2026 initially reported by MalwareBytes. 2. HWMonitor comes packaged with a malicious CRYPTBASE.dll. CRYPTBASE.dll is a legitimate Windows library, but they made a fake one to blend in (malware masquerading). This DLL is responsible for connecting to their C2 and downloading the other malware stages. 3. It tries to detect emulation and prevent reverse engineering by checking for the presence of specific registry keys on the machine. However, they failed doing this and didn't account for everything. Notably, they only check for VirtualBox (whomp, whomp). 4. It downloads a .cs file from a remote C2 and then compiles it manually on the machine by invoking .NET stuff. This is an interesting strategy. It does all of this via Powershell (LOLBIN nonsense). 5. The .cs file it compiles is a .NET binary with NTDLL exports. The main HWMonitor binary performs process injection using this compiled .NET binary. This is an interesting strategy. 6. Almost everything it does is performed in-memory. I would have to do through this and manually bonk all of this stuff with a stick and determine precisely how it operates. However, I don't think that is necessary because at this point we know this is malware and we know it's trying to steal browser credentials. +2 points for IElevation COM Interface credential dumping +1 point for inline Powershell CLI DLL compilation +1 point for .NET assembly NTDLL export proxying -1 point for botched anti-emulation +2 points for website compromise and supply chain attack +1 point for memory persistence -3 points for recycling the same C2 from March, 2026 campaign Overall I give this malware a B-. This is pretty good malware.
vx-underground tweet media
English
45
176
2.2K
188.3K
FACEIT Darwin
FACEIT Darwin@FACEIT_Darwin·
@YTWestbomb I don't think match draws are something we're considering at the moment, especially considering some of the best moments on FACEIT have come from long games (donk 95 kills, for example)
English
13
0
167
8.8K
westsidbwln on faceit
westsidbwln on faceit@YTWestbomb·
.@FACEIT_Darwin happy easter. FUCK UNLIMITED OVERTIME. give me 2 chances then get me out. 2 HOURS FOR ONE PUG IS FUCKING STUPID
English
6
0
41
12.1K
BERSENT
BERSENT@BERSENTgg·
We are looking for a 5th player! 👹 🔺 duelist/sentinel/controller 🔺 16+ 🔺 very vocal/mid-rounding/2nd caller 🔺 high availability 🔺 willing to grind and improve 🔺 long term only❗️ dm @anubis_vlr on twitter or “legitjustbad” discord
BERSENT tweet media
English
24
12
118
24.7K
ᅟ
@vegowski·
@itsRealHYPEX when will you admit that u work in epic
English
0
0
0
21
HYPEX²
HYPEX²@itsRealHYPEX·
ask me anything you'd like to know about my main account but: - i don't know when things return to the shop i swear - i don't know what happened with RE, ill make a tweet later
English
354
20
1.1K
151.3K
Cy
Cy@formulacy·
@jeff45587162990 this while defending Boo for retweeting a racist tweet that was apparently "accidental" and multiple clips of him insulting turkish people while playing ranked
Cy tweet media
English
4
0
1
6.3K
Tom Cornish
Tom Cornish@tomcornishh·
Customs are now fixed for all Epic Gamemodes and UEFN🔥 But Chris has shared some teasers of Custom Matchmaking Settings (FINALLY). Controlling the weather, the storm, and even disabling PvP! Streamers and content creators have been asking for this for years, so it’s great that we’re finally getting these options!
Elite Tofu (Daigo Chris)@EpicTofuChris

@tomcornishh Bug. We're on it! Though while we're here, maybe we can do you one better this season 👀. @NickEh30 , your time to shine ☀️//⛈️⏸️//🔫❌

English
3
9
210
29.9K
clair
clair@softbnnuy·
pls who got me
clair tweet media
English
29
1
190
15K
Leo Faria
Leo Faria@lhfaria·
Huge kudos to @SRVAL Gold and @KRUesports Blaze for making their way into the VCT main circuit! Great inspiration for us at Riot and for all the GC players grinding day in and day out.
Leo Faria tweet mediaLeo Faria tweet media
English
16
194
4.8K
233.7K