12/20/17 13:19:25: 1088 RptApiCall: disposition TERMINATE: hash 0x3a256bb4, name C:\Program Files (x86)\BinaryFortress\DisplayFusion\DisplayFusionHookApp64.exe, pid 12256, args "C:\Program Files (x86)\BinaryFortress\DisplayFusion\DisplayFusionHookApp64.exe" "7828" "789410" "4134162" "660352" "131332" "65860" "a83da093-43c5-4952-8186-8f296ed66aa6" "C:\Program Files (x86)\BinaryFortress\DisplayFusion\Hooks\AppHook64_2F44A6BB-F31F-400E-8715-4EC08A3FC635.dll" "DisplayFusion" "Software\Binary Fortress Software\DisplayFusion" , disp 0x80, interpreted 0, rep 0x40000, eff src AV, eff rep 0x40000, fname SetWindowsHookExW, target name C:\Program Files (x86)\BinaryFortress\DisplayFusion\DisplayFusionHookApp64.exe, target pid 0, target eff src Not Available, target eff rep 0x80000000, policy (0x0, 0x800000, 0x0, 0xc0, 0x0) delay (0, 0, 0x0), mask 0x08d: id 119482 12/20/17 13:19:25: 1088 The application "C:\Program Files (x86)\BinaryFortress\DisplayFusion\DisplayFusionHookApp64.exe" attempted to inject code into the process "C:\Program Files (x86)\BinaryFortress\DisplayFusion\DisplayFusionHookApp64.exe" by calling the function "SetWindowsHookExW". The operation was blocked and the application terminated by Confer