The researcher shows the execution of the trojan on a Windows 7 system, and then demonstrates the effect. What I find puzzling, misleading and mischievous is that he doesn't ad a caveat to his presentation - that he is testing it on a configuration not found in any default Windows installation - running a built-in Administrator account where all programs enjoy full system-wide access and elevation without prompting for it.
I understand that the tweetbot trojan would look less sinister if it raised an 'I came from the internet and could be bad' and a UAC prompt before being executed, and that malware can use various tactics to silently elevate themselves, but this post and the video should at least mention one fact about this 'controlled environment' - that usually you just can't execute an .exe from the desktop in Windows 7 and say that 'nothing seems to happen'.