title: DN_0019_15_windows_sysmon_FileCreateStreamHash description: > This event logs when a named file stream is created, and it generates events that log the hash of the contents of the file to which the stream is assigned (the unnamed stream), as well as the contents of the named stream loggingpolicy: - None references: - https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-15.md - https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015 category: OS Logs platform: Windows type: Applications and Services Logs channel: Microsoft-Windows-Sysmon/Operational provider: Microsoft-Windows-Sysmon fields: - EventID - Computer - Hostname # redundant - UtcTime - ProcessGuid - ProcessId - Image - TargetFilename - CreationUtcTime - Hash sample: | - - 15 2 4 15 0 0x8000000000000000 34115 Microsoft-Windows-Sysmon/Operational atc-win-10.atc.local - 2019-01-21 12:43:53.368 {9683FBB1-A860-5C45-0000-0010274F1400} 6604 C:\windows\Explorer.EXE C:\Users\user1\Downloads\wce_v1_42beta_x64\wce.exe 2013-11-11 22:41:40.000 MD5=CCF1D1573F175299ADE01C07791A6541,SHA256=68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2