What to do with MD5 checksums of files provided as an Indicator of Compromise?