How Hackers Evade Your AI-enabled Endpoint Detection Tools