Does anyone have any idea why GoToMeeting hashes are present in this list? It's not a remote access tool, of course you could go into a meeting with a threat actor where he asks that you share your screen and give control, still that does not make it a remote access tool.
Any idea?