Regarding the malware used in this video:
Of the 7 files, 4 were Scriptor Worms, and the other 3 were regular malicious files. Of these latter 3, 2 were detected and deleted (silently); the third was coded to spawn a copy of itself- although this is normally done by dropping the daughter (which will auto-run on the drop) into the Roaming directory, this one was coded to place it on the Desktop to make the ZA detection of it easier to follow.
You may have noted that although the original was deleted, the copy reappeared on the desktop were it was detected and deleted once again. Of the 4 Worms, one was detected and deleted right away, of the other 3, two were able to connect out, one was not. But it is important to note that all 3 were coded to persist on reboot.
On Reboot, one was dropped into Roaming where it was detected and stopped (although not shown, trust me on this). Of the other two, as can be seen one created the Powershell connection to Ukraine (not good) and the other morphed into the false svchost.exe (termed a Mimic) that connected out to a Confluence Networks server in Austin, Texas. It should be noted that this server is actually a Proxy for a known Malware server located in Road Town, British Virgin Islands.