This section contains files hashes that can be used to verify integrity of files used in this adversary emulation plan.
It is recommended that users hash executables and scripts prior to execution to confirm that illicit changes have not been made.