Usualy involves gaining remote access to your PC
There may be different "scripts" for this, but all the ones I've heard / read about don't attempt to do anything to gain control - other than ask the person to execute various commands (e.g. netstat -b) to "demonstrate" how the PC is "infected".
SD