hi
thanks
video:
7.45 min
Your almost 8 minutes long video which you uploaded is useless.
I've already given you the answers in my previous response and I even installed Kaspersky Anti-Virus on my host machine just to double check that I was correct. Open up Task Manager, go to the Details tab and attempt to terminate avpui.exe... If the result given is Access Denied then it means that the Kaspersky self-protection is indeed working correctly - then attempt to suspend avpui.exe in Process Hacker without giving it administrative rights, and you should get the same result.
If you grant Process Hacker administrative rights then it is able to load it's device driver (kprocesshacker.sys - present in the binaries folder which was seen in your first video, the x64 folder) which supports using a kernel-mode only function known as ObOpenObjectByPointer to bypass the access checks which occur when you attempt to open a handle to a process via NtOpenProcess, meaning the handle will be acquired from within kernel-mode regardless of the kernel-mode callback being used to protect the Kaspersky processes. From there on, this handle can be utilised for process termination, suspension, injection, etc.
The only thing Kaspersky can do to protect against such attacks would be kernel-mode patching techniques, however this cannot be ethically done on x64 versions of Windows since Windows Vista due to PatchGuard/Kernel Patch Protection. On x64 systems you cannot perform SSDT hooking (for example) since the table is not exported and due to BugCheck; if it could be done without a bypass of the Windows protection mechanisms then of course Kaspersky could hook these functions and have a much better secure self-protection. I've written a thread about PatchGuard/Kernel Patch Protection before (last section of the thread), you can find it here:
Windows built-in protection mechanisms
I am going to assume that you already knew that Process Hacker (when running as administrator) was capable of suspending the Kaspersky processes. Try it with the others and it should work too... In fact, it should work for other AV products as well. If Process Hacker is capable of loading that device driver and connecting to it then it can do whatever it wants since it can have the actions performed from kernel-mode, bypassing the security protection being put in place - if all you want is a Like then do not hesitate to ask, I'll give you a Like for all your posts in this thread, better?
I don't understand what you expect to be done about this, clearly you are just trying to embarrass them, and I am not sure why. Maybe you think it is cool? Nothing can be done about these kernel-mode attacks by the vendors, and they already know about them. Once code execution is granted in kernel-mode then it's pretty much game over because then an attacker can circumvent and do whatever they want, it's as close to the OS kernel as you can get.
Feel free to speak to Kaspersky, I can already guess they will tell you something along the lines of: you need SeLoadDriverPrivilege to load a device driver (granted if you are running as admin) and that they cannot protect against these kernel-mode attacks, just like every other vendor cannot, especially for x64.
If you don't want to believe what I have said then don't, but a fact is a fact.
Thanks for understanding.