Injection_3de7000.exe
Services like Any.Run or Joe Sandbox often rename dropped payloads based on their memory offsets.
Malware like Emotet or Qakbot often drops intermediate stages into %TEMP% or %APPDATA% with semi-randomized names during the "injection" phase of an infection. injection_3DE7000.exe
Providing the hash would allow for a search in malware databases to find the actual "paper" or threat report associated with the underlying malware family. Services like Any