I was cleaning out a client's site that got hacked after I had cleaned it once already, when I found a cron job pointing to a script in the server /tmp director
ejabberd-auth
freemind
simple.odata
type-declaration
htmlunit
html-framework-7
primer3
richtext
ipsec
ios8-today-widget
user-secret
icloud-documents
raspbian-buster
bootbox
nrql
textkit
yii2-user-roles
dynamic-rebinding
dynamics-sl
user-permissions
nfs
flutter-alertdialog
popen
vlfeat
bowser
applitools
fakexrmeasy
azure-cosmosdb-emulator
formula.js
react-data-grid