Developer: Ahn Lab Inc
Platform(s): Microsoft Windows
It works by redirecting threads created by EHSvc.dll
@PFN_ENGINE_SECURE_CALL it's the address which is pointing with the Ordinal 10(or 16, don't remember)
It is developed for HS version 5.6.22.369 (Update Coding 14 march 2014)
Coding: Eca|ErcHimA|
XORStr (for who doesnt have the class)
Have Fun