Anything and everything. Most just corrupt your system. Meaning, they make your operating system not function anymore. Some are made to spy on you. There are many attack vectors. One being through E-mail attachments. And those are typically designed to hack a network.