Skip to content

Commit 6fd5cce

Browse files
UnownBotUnownPlainKarbitsCode
authored
New version: Microsoft.Sysinternals.Suite version 2026-02-04 (microsoft#336670)
Co-authored-by: UnownPlain <git@unownplain.dev> Co-authored-by: KarbitsCode <107671693+KarbitsCode@users.noreply.github.com>
1 parent db05c16 commit 6fd5cce

File tree

3 files changed

+133
-133
lines changed

3 files changed

+133
-133
lines changed

manifests/m/Microsoft/Sysinternals/Suite/2025-12-16/Microsoft.Sysinternals.Suite.installer.yaml renamed to manifests/m/Microsoft/Sysinternals/Suite/2026-02-04/Microsoft.Sysinternals.Suite.installer.yaml

Lines changed: 123 additions & 123 deletions
Original file line numberDiff line numberDiff line change
@@ -1,129 +1,13 @@
1-
# Created with komac v2.14.0
2-
# yaml-language-server: $schema=https://aka.ms/winget-manifest.installer.1.10.0.schema.json
1+
# Created by Anthelion using komac v2.15.0
2+
# yaml-language-server: $schema=https://aka.ms/winget-manifest.installer.1.12.0.schema.json
33

44
PackageIdentifier: Microsoft.Sysinternals.Suite
5-
PackageVersion: 2025-12-16
5+
PackageVersion: 2026-02-04
66
InstallerLocale: en-US
77
InstallerType: zip
88
NestedInstallerType: portable
9-
ReleaseDate: 2025-12-16
9+
ReleaseDate: 2026-02-04
1010
Installers:
11-
- Architecture: arm64
12-
NestedInstallerFiles:
13-
- RelativeFilePath: ADExplorer64a.exe
14-
PortableCommandAlias: ADExplorer
15-
- RelativeFilePath: ADInsight64a.exe
16-
PortableCommandAlias: ADInsight
17-
- RelativeFilePath: Autologon64a.exe
18-
PortableCommandAlias: Autologon
19-
- RelativeFilePath: Autoruns64a.exe
20-
PortableCommandAlias: Autoruns
21-
- RelativeFilePath: Clockres64a.exe
22-
PortableCommandAlias: Clockres
23-
- RelativeFilePath: Contig64a.exe
24-
PortableCommandAlias: Contig
25-
- RelativeFilePath: Coreinfo64a.exe
26-
PortableCommandAlias: Coreinfo
27-
- RelativeFilePath: Dbgview64a.exe
28-
PortableCommandAlias: Dbgview
29-
- RelativeFilePath: DiskView64a.exe
30-
PortableCommandAlias: DiskView
31-
- RelativeFilePath: FindLinks64a.exe
32-
PortableCommandAlias: FindLinks
33-
- RelativeFilePath: LoadOrd64a.exe
34-
PortableCommandAlias: LoadOrd
35-
- RelativeFilePath: LoadOrdC64a.exe
36-
PortableCommandAlias: LoadOrdC
37-
- RelativeFilePath: Procmon64a.exe
38-
PortableCommandAlias: Procmon
39-
- RelativeFilePath: PsExec64a.exe
40-
PortableCommandAlias: PsExec
41-
- RelativeFilePath: PsGetsid64a.exe
42-
PortableCommandAlias: PsGetsid
43-
- RelativeFilePath: PsInfo64a.exe
44-
PortableCommandAlias: PsInfo
45-
- RelativeFilePath: PsService64a.exe
46-
PortableCommandAlias: PsService
47-
- RelativeFilePath: RAMMap64a.exe
48-
PortableCommandAlias: RAMMap
49-
- RelativeFilePath: RegDelNull64a.exe
50-
PortableCommandAlias: RegDelNull
51-
- RelativeFilePath: Sysmon64a.exe
52-
PortableCommandAlias: Sysmon
53-
- RelativeFilePath: Winobj64a.exe
54-
PortableCommandAlias: Winobj
55-
- RelativeFilePath: ZoomIt64a.exe
56-
PortableCommandAlias: ZoomIt
57-
- RelativeFilePath: accesschk64a.exe
58-
PortableCommandAlias: accesschk
59-
- RelativeFilePath: adrestore64a.exe
60-
PortableCommandAlias: adrestore
61-
- RelativeFilePath: autorunsc64a.exe
62-
PortableCommandAlias: autorunsc
63-
- RelativeFilePath: disk2vhd64a.exe
64-
PortableCommandAlias: disk2vhd
65-
- RelativeFilePath: diskext64a.exe
66-
PortableCommandAlias: diskext
67-
- RelativeFilePath: du64a.exe
68-
PortableCommandAlias: du
69-
- RelativeFilePath: handle64a.exe
70-
PortableCommandAlias: handle
71-
- RelativeFilePath: hex2dec64a.exe
72-
PortableCommandAlias: hex2dec
73-
- RelativeFilePath: junction64a.exe
74-
PortableCommandAlias: junction
75-
- RelativeFilePath: logonsessions64a.exe
76-
PortableCommandAlias: logonsessions
77-
- RelativeFilePath: movefile64a.exe
78-
PortableCommandAlias: movefile
79-
- RelativeFilePath: notmyfault64a.exe
80-
PortableCommandAlias: notmyfault
81-
- RelativeFilePath: notmyfaultc64a.exe
82-
PortableCommandAlias: notmyfaultc
83-
- RelativeFilePath: pendmoves64a.exe
84-
PortableCommandAlias: pendmoves
85-
- RelativeFilePath: pipelist64a.exe
86-
PortableCommandAlias: pipelist
87-
- RelativeFilePath: procdump64a.exe
88-
PortableCommandAlias: procdump
89-
- RelativeFilePath: procexp64a.exe
90-
PortableCommandAlias: procexp
91-
- RelativeFilePath: psfile64a.exe
92-
PortableCommandAlias: psfile
93-
- RelativeFilePath: pskill64a.exe
94-
PortableCommandAlias: pskill
95-
- RelativeFilePath: pslist64a.exe
96-
PortableCommandAlias: pslist
97-
- RelativeFilePath: psloglist64a.exe
98-
PortableCommandAlias: psloglist
99-
- RelativeFilePath: pspasswd64a.exe
100-
PortableCommandAlias: pspasswd
101-
- RelativeFilePath: psping64a.exe
102-
PortableCommandAlias: psping
103-
- RelativeFilePath: pssuspend64a.exe
104-
PortableCommandAlias: pssuspend
105-
- RelativeFilePath: ru64a.exe
106-
PortableCommandAlias: ru
107-
- RelativeFilePath: sdelete64a.exe
108-
PortableCommandAlias: sdelete
109-
- RelativeFilePath: sigcheck64a.exe
110-
PortableCommandAlias: sigcheck
111-
- RelativeFilePath: streams64a.exe
112-
PortableCommandAlias: streams
113-
- RelativeFilePath: strings64a.exe
114-
PortableCommandAlias: strings
115-
- RelativeFilePath: sync64a.exe
116-
PortableCommandAlias: sync
117-
- RelativeFilePath: tcpvcon64a.exe
118-
PortableCommandAlias: tcpvcon
119-
- RelativeFilePath: tcpview64a.exe
120-
PortableCommandAlias: tcpview
121-
- RelativeFilePath: vmmap64a.exe
122-
PortableCommandAlias: vmmap
123-
- RelativeFilePath: whois64a.exe
124-
PortableCommandAlias: whois
125-
InstallerUrl: https://download.sysinternals.com/files/SysinternalsSuite-ARM64.zip
126-
InstallerSha256: 0D29363FD878C00F50219BD638CE2DF960B9C93FE800B31230A11A3F120A3095
12711
- Architecture: x86
12812
NestedInstallerFiles:
12913
- RelativeFilePath: ADExplorer.exe
@@ -205,7 +89,7 @@ Installers:
20589
- RelativeFilePath: vmmap.exe
20690
- RelativeFilePath: whois.exe
20791
InstallerUrl: https://download.sysinternals.com/files/SysinternalsSuite.zip
208-
InstallerSha256: A0ECE4C52EE9C71C3C02038245D3E0B3C6150FFF0E26BD7BDF882FC7EE54CF69
92+
InstallerSha256: 1EFA388C6D244E2D20DF99EA1F4F48B5C38990D8A978BC334DE51F374BC16C4C
20993
- Architecture: x64
21094
NestedInstallerFiles:
21195
- RelativeFilePath: ADExplorer64.exe
@@ -354,6 +238,122 @@ Installers:
354238
- RelativeFilePath: whois64.exe
355239
PortableCommandAlias: whois
356240
InstallerUrl: https://download.sysinternals.com/files/SysinternalsSuite.zip
357-
InstallerSha256: A0ECE4C52EE9C71C3C02038245D3E0B3C6150FFF0E26BD7BDF882FC7EE54CF69
241+
InstallerSha256: 1EFA388C6D244E2D20DF99EA1F4F48B5C38990D8A978BC334DE51F374BC16C4C
242+
- Architecture: arm64
243+
NestedInstallerFiles:
244+
- RelativeFilePath: ADExplorer64a.exe
245+
PortableCommandAlias: ADExplorer
246+
- RelativeFilePath: ADInsight64a.exe
247+
PortableCommandAlias: ADInsight
248+
- RelativeFilePath: Autologon64a.exe
249+
PortableCommandAlias: Autologon
250+
- RelativeFilePath: Autoruns64a.exe
251+
PortableCommandAlias: Autoruns
252+
- RelativeFilePath: Clockres64a.exe
253+
PortableCommandAlias: Clockres
254+
- RelativeFilePath: Contig64a.exe
255+
PortableCommandAlias: Contig
256+
- RelativeFilePath: Coreinfo64a.exe
257+
PortableCommandAlias: Coreinfo
258+
- RelativeFilePath: Dbgview64a.exe
259+
PortableCommandAlias: Dbgview
260+
- RelativeFilePath: DiskView64a.exe
261+
PortableCommandAlias: DiskView
262+
- RelativeFilePath: FindLinks64a.exe
263+
PortableCommandAlias: FindLinks
264+
- RelativeFilePath: LoadOrd64a.exe
265+
PortableCommandAlias: LoadOrd
266+
- RelativeFilePath: LoadOrdC64a.exe
267+
PortableCommandAlias: LoadOrdC
268+
- RelativeFilePath: Procmon64a.exe
269+
PortableCommandAlias: Procmon
270+
- RelativeFilePath: PsExec64a.exe
271+
PortableCommandAlias: PsExec
272+
- RelativeFilePath: PsGetsid64a.exe
273+
PortableCommandAlias: PsGetsid
274+
- RelativeFilePath: PsInfo64a.exe
275+
PortableCommandAlias: PsInfo
276+
- RelativeFilePath: PsService64a.exe
277+
PortableCommandAlias: PsService
278+
- RelativeFilePath: RAMMap64a.exe
279+
PortableCommandAlias: RAMMap
280+
- RelativeFilePath: RegDelNull64a.exe
281+
PortableCommandAlias: RegDelNull
282+
- RelativeFilePath: Sysmon64a.exe
283+
PortableCommandAlias: Sysmon
284+
- RelativeFilePath: Winobj64a.exe
285+
PortableCommandAlias: Winobj
286+
- RelativeFilePath: ZoomIt64a.exe
287+
PortableCommandAlias: ZoomIt
288+
- RelativeFilePath: accesschk64a.exe
289+
PortableCommandAlias: accesschk
290+
- RelativeFilePath: adrestore64a.exe
291+
PortableCommandAlias: adrestore
292+
- RelativeFilePath: autorunsc64a.exe
293+
PortableCommandAlias: autorunsc
294+
- RelativeFilePath: disk2vhd64a.exe
295+
PortableCommandAlias: disk2vhd
296+
- RelativeFilePath: diskext64a.exe
297+
PortableCommandAlias: diskext
298+
- RelativeFilePath: du64a.exe
299+
PortableCommandAlias: du
300+
- RelativeFilePath: handle64a.exe
301+
PortableCommandAlias: handle
302+
- RelativeFilePath: hex2dec64a.exe
303+
PortableCommandAlias: hex2dec
304+
- RelativeFilePath: junction64a.exe
305+
PortableCommandAlias: junction
306+
- RelativeFilePath: logonsessions64a.exe
307+
PortableCommandAlias: logonsessions
308+
- RelativeFilePath: movefile64a.exe
309+
PortableCommandAlias: movefile
310+
- RelativeFilePath: notmyfault64a.exe
311+
PortableCommandAlias: notmyfault
312+
- RelativeFilePath: notmyfaultc64a.exe
313+
PortableCommandAlias: notmyfaultc
314+
- RelativeFilePath: pendmoves64a.exe
315+
PortableCommandAlias: pendmoves
316+
- RelativeFilePath: pipelist64a.exe
317+
PortableCommandAlias: pipelist
318+
- RelativeFilePath: procdump64a.exe
319+
PortableCommandAlias: procdump
320+
- RelativeFilePath: procexp64a.exe
321+
PortableCommandAlias: procexp
322+
- RelativeFilePath: psfile64a.exe
323+
PortableCommandAlias: psfile
324+
- RelativeFilePath: pskill64a.exe
325+
PortableCommandAlias: pskill
326+
- RelativeFilePath: pslist64a.exe
327+
PortableCommandAlias: pslist
328+
- RelativeFilePath: psloglist64a.exe
329+
PortableCommandAlias: psloglist
330+
- RelativeFilePath: pspasswd64a.exe
331+
PortableCommandAlias: pspasswd
332+
- RelativeFilePath: psping64a.exe
333+
PortableCommandAlias: psping
334+
- RelativeFilePath: pssuspend64a.exe
335+
PortableCommandAlias: pssuspend
336+
- RelativeFilePath: ru64a.exe
337+
PortableCommandAlias: ru
338+
- RelativeFilePath: sdelete64a.exe
339+
PortableCommandAlias: sdelete
340+
- RelativeFilePath: sigcheck64a.exe
341+
PortableCommandAlias: sigcheck
342+
- RelativeFilePath: streams64a.exe
343+
PortableCommandAlias: streams
344+
- RelativeFilePath: strings64a.exe
345+
PortableCommandAlias: strings
346+
- RelativeFilePath: sync64a.exe
347+
PortableCommandAlias: sync
348+
- RelativeFilePath: tcpvcon64a.exe
349+
PortableCommandAlias: tcpvcon
350+
- RelativeFilePath: tcpview64a.exe
351+
PortableCommandAlias: tcpview
352+
- RelativeFilePath: vmmap64a.exe
353+
PortableCommandAlias: vmmap
354+
- RelativeFilePath: whois64a.exe
355+
PortableCommandAlias: whois
356+
InstallerUrl: https://download.sysinternals.com/files/SysinternalsSuite-ARM64.zip
357+
InstallerSha256: DF69341B7F8A11E2925B8E261A165766681AA7FA4B5F336DD3B224DD62B8062E
358358
ManifestType: installer
359-
ManifestVersion: 1.10.0
359+
ManifestVersion: 1.12.0

manifests/m/Microsoft/Sysinternals/Suite/2025-12-16/Microsoft.Sysinternals.Suite.locale.en-US.yaml renamed to manifests/m/Microsoft/Sysinternals/Suite/2026-02-04/Microsoft.Sysinternals.Suite.locale.en-US.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
1-
# Created with komac v2.14.0
2-
# yaml-language-server: $schema=https://aka.ms/winget-manifest.defaultLocale.1.10.0.schema.json
1+
# Created by Anthelion using komac v2.15.0
2+
# yaml-language-server: $schema=https://aka.ms/winget-manifest.defaultLocale.1.12.0.schema.json
33

44
PackageIdentifier: Microsoft.Sysinternals.Suite
5-
PackageVersion: 2025-12-16
5+
PackageVersion: 2026-02-04
66
PackageLocale: en-US
77
Publisher: Sysinternals
88
PublisherUrl: https://www.sysinternals.com/
9-
PublisherSupportUrl: https://learn.microsoft.com/en-us/sysinternals/
9+
PublisherSupportUrl: https://learn.microsoft.com/en-us/answers/tags/435/sysinternals
1010
PrivacyUrl: https://learn.microsoft.com/en-us/sysinternals/license-terms
1111
Author: Sysinternals Team
1212
PackageName: Sysinternals Suite
1313
PackageUrl: https://learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
1414
License: Proprietary
1515
LicenseUrl: https://learn.microsoft.com/en-us/sysinternals/license-terms
16-
Copyright: Copyright © 1996-2025 Mark Russinovich
16+
Copyright: Copyright © 1996-2026 Sysinternals
1717
ShortDescription: Sysinternals Suite is a bundle of the Sysinternals utilities including Process Explorer, Process Monitor, Sysmon, Autoruns, ProcDump, all of the PsTools, and many more.
1818
Description: |-
1919
Sysinternals Suite is a bundle of the Sysinternals utilities including Process Explorer, Process Monitor, Sysmon, Autoruns, ProcDump, all of the PsTools, and many more.
@@ -36,4 +36,4 @@ Documentations:
3636
- DocumentLabel: Troubleshooting with the Windows Sysinternals Tools
3737
DocumentUrl: https://learn.microsoft.com/en-us/sysinternals/resources/troubleshooting-book
3838
ManifestType: defaultLocale
39-
ManifestVersion: 1.10.0
39+
ManifestVersion: 1.12.0

manifests/m/Microsoft/Sysinternals/Suite/2025-12-16/Microsoft.Sysinternals.Suite.yaml renamed to manifests/m/Microsoft/Sysinternals/Suite/2026-02-04/Microsoft.Sysinternals.Suite.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# Created with komac v2.14.0
2-
# yaml-language-server: $schema=https://aka.ms/winget-manifest.version.1.10.0.schema.json
1+
# Created by Anthelion using komac v2.15.0
2+
# yaml-language-server: $schema=https://aka.ms/winget-manifest.version.1.12.0.schema.json
33

44
PackageIdentifier: Microsoft.Sysinternals.Suite
5-
PackageVersion: 2025-12-16
5+
PackageVersion: 2026-02-04
66
DefaultLocale: en-US
77
ManifestType: version
8-
ManifestVersion: 1.10.0
8+
ManifestVersion: 1.12.0

0 commit comments

Comments
 (0)