Worst case.
Strictly speaking, a machine where someone got to run something you don't know - whatever it actually did - is to be treated as "compromised", i.e., all accounts on it have to have their password changed, the data saved to backup before reformatting the machine, reinstalling the OS and restoring the documents - if you're really paranoid, the documents first need to be converted in a less vulnerable format (so for example all PDFs to Jscript-less PDFs, all Word DOCs to macro-less RTFs, and so on), and the backup virus-scanned from another, known good machine.
Also, any home banking accounts need to be re-secured, and all sensitive information (credit card numbers, emails etc.) checked and, if necessary, invalidated and re-issued.
Even apparently "innocuous" information might be used to impersonate someone even weeks after, and there are actually scamming "firms" that purchase such information from lesser criminals and "groom" them for weeks or months before striking (bottom line: you being scammed by an apparently innocuous "small fish" out of potentially sensitive information might end up, much later, with that information in the hands of those who can make the most out of it).
In its most visible form this is called "CEO email fraud". I have been personally involved in investigations in two such (much smaller, around USD 100,000) cases, but the latest case I know of is just days ago ("The CEO mail was false: 17 million USD lost"). So if you're involved with a large and possibly vulnerable firm (head accountant, books reviewer, CEO, lawyer, consultant etc.), take care to warn them. The market is so juicy that people are working hard at such heists.
Likelier (in MY opinion) case.
It is possible - I suspect "likely" - that nothing got compromised, and the guy at the other end of the line just typed some command like DIR /S or TREE to cause a lot of "computerish-looking" output.
The next step would have been to tell you that your PC had been infected, whatever antivirus you were using was no good, and you needed the new and enhanced antivirus from Apple Support.
Sometimes they also insist that if you refuse, they have no choice but to disable your Apple ID since it may be used to commit fraud, rape, arson, murder and rape.
At this point you are directed to a website where you can purchase said antivirus for a reasonable fee. And that is when you get it in the neck.
There several flavours of this scam:
- "almost honest" scam: you are buying a semi-fake product that will also try to have you purchase additional plugins, enhancements, add-ons and so on.
- credit card fraud: you enter your credit card details to make the purchase, and, well.
- the application you're buying is not an antivirus at all but mainly a backdoor. Your system is now well and truly compromised, in addition to the financial damage. The backdoor access might also later be sold to worse criminals. Usually it gets immediate use as spam relay, cryptocoin mining and distributed denial of service, all services that are commonly marketed on the dark Web. It goes without saying that all interesting information on the machine will get pillaged (up to and including the worst case, above).