DeepRed targetted Disekt running CROMU_00055 in round 9.
Type 2 POV
Reading from protected address: 0x4347c041
0x804f1d2 : movsx edx,byte ptr [edx]
Tracing data from eip: 0x804f1d2 tracing source of register: edx (value: 0x4347c041)
0x804fd27 : receive syscall (return)
0x804acd4 : mov edi,dword ptr [edi+0x4]
0x804acfd : mov dword ptr [esp+0x10],edi
0x804da8c : mov eax,dword ptr [eax]
0x804da8e : mov dword ptr [ebp-0x40],eax
0x804da9a : mov esi,dword ptr [ebp-0x40]
0x804dac3 : mov dword ptr [esp+0xc],esi
0x804f012 : mov esi,dword ptr [ebp+0x14]
0x804f02a : mov dword ptr [ebp-0x20],esi
0x804f1c4 : mov edx,dword ptr [ebp-0x20]
0x804f1d2: movsx edx,byte ptr [edx] // address: edx value: 0x4347c041