Randissimo, I see you many things do not understand or do not want to understand so I will stop to explain as you stubbornly pursue your own story even though I clearly explained how the things are but you do not want to hear abaut.
aswMBR does not work on userspace nor is it an essential part for him, it checks only when it start avast engine in small, short range (services). ARK are kernel based tools.
Why do other companies like Malwarebytes or Kaspersky or the one behind GMER even bother to make their anti-rootkit tools work on Windows 8.X when Secure Boot and UEFI installation on GPT formated drives supposedly prevent every rootkit?
Malwarebytes and Kaspersky ( MBAR and TDSSKiller ) works on known level of detection. They shall detect and remove only these rootkits that is known to them.
They have a large range of database and many heuristic detection, but in addition they can always skip of detectio and allow to run some malicious rootkit for which they are not aware that it is malicious.
GMER again works differently, purely diagnostic nature. GMER should report in his ARK logs any suspicious-legitimate and malicious activity. It will not always detect the loading point but for helper who preform diagnosis and who can read GMER logs (a lot of them do not know), this is enough.