DeepRed targetted CSDS running CROMU_00055 in round 13. 
 
  Type 2 POV 
 Reading from protected address: 0x4347c041
 0x9463ea2 : movsx edx,byte ptr [edx] 
Tracing data from eip: 0x9463ea2 tracing source of register: edx (value: 0x4347c041)
 0x9465f96 : receive syscall (return)
 0x94623c4 : mov edi,dword ptr [edi+0x4]
 0x94623ed : mov dword ptr [esp+0x10],edi
 0x94628fb : mov eax,dword ptr [eax]
 0x94628fd : mov dword ptr [ebp-0x40],eax
 0x9462909 : mov esi,dword ptr [ebp-0x40]
 0x9462932 : mov dword ptr [esp+0xc],esi
 0x9463d4e : mov esi,dword ptr [ebp+0x18]
 0x9463d66 : mov dword ptr [ebp-0x20],esi
 0x9463e97 : mov edx,dword ptr [ebp-0x20]
 0x9463ea2: movsx edx,byte ptr [edx] // address: edx value: 0x4347c041