http://technet.microsoft.com/en-us/sysinternals/bb842062
Updated: January 29, 2015
sha256sum 74026d3b20b4f1051e4e9515ea58fc555f83f3a685ba4ed08dcedff9d94bda67 SysinternalsSuite.zip
bb45d8ffe245c361c04cca44d0df6e6bd7596cabd70070ffe0d9f519e3b620ea ADExplorer.exe
7f9c32bd71e48c6cd1aecbaeab7031a4604fc52651272e1446b6773fd6d5b5da ADInsight.chm
e4ec9fabd29bc41c1875de28d37228badf59e87697d9ae9a17836ae5d35e359a ADInsight.exe
a4cc61f6c7ed716e4622e12b75f05ea17e79a45f0d8bd6855c340a30ec882b47 AccessEnum.exe
a89a59be46f8511e385427c942d352429072b5a83d501ca08463942abcf8e5a3 AdExplorer.chm
221a5cba280b88e237e89898e4d744725de05ae5d209e14b4bafab2350f08701 Autologon.exe
0362cd6e7b318ab9a4c74daf229f11bb795a2ce553ea024cb49143456c27c41d Bginfo.exe
86ccaefa38445954555385ceb21d206b98175791d5f0895b0efabf0d4e40a675 Cacheset.exe
4d26b13f873ad3b8f5e06ed92dff018561fb7090a2a0d4d5e20a47b29b1773fe Clockres.exe
3d2593f5264736ba5f897c9cb167c4aeccc1568bd03de7df27a9b15e63e5da68 Contig.exe
500c154366bde8f5d60933a29cc8887e3767769936eaf5edcaa6f3988da272cf Coreinfo.exe
33278d846bb91e5746ca2baf78853e5b52ab0fdd7b02a938154c082ec7d85024 DISKMON.HLP
23417fe51bfcc5eeb16a65c3e583d15afe9a7370fa388db10900e59fcf9044b6 DMON.SYS
1244bd02a203bec1b1e0ab85ed8ed83501ec4d17e613f1934951abeb7956abb0 Dbgview.exe
5a4605c2bd6e363d92723bf54b0ae2c131ea9741373e66558e42220d2f79ba9c Desktops.exe
56b375c7db8525c93a308bb095343b74ce85a01355ff486afa6ffbdf1471a7a9 Disk2vhd.chm
d186dac0a61eb1331d1371c733ec4b1925baed55f3c17f67efece537496050ff DiskView.exe
955faa2fcec977b29fb7dc49a80b8c7916c410b70ad973c7883ed8537126f81f Diskmon.exe
6ff22c87fb5ee105b33346dbb3f13f3049a292981e9df1eb8591e858ccf4d782 Eula.txt
cc2fcfa0e629d8df76377e610a0a973588ad1b087700dfb10f3780926e3da387 FindLinks.exe
020d4b225126f93254a15dae24c80c0b889d945f7a3e552e3b0f2b35939a8d2b Listdlls.exe
ff5fc78a10dc5e3421e72ce3b48f6a63ba5ae849aad148ab62ac039e0fe0803d LoadOrd.exe
0129cf544234e91ce119940a6f2cc9842ecbb3723f9de9b62fd985c8ad02a21b PORTMON.CNT
4e55c9b6a6147766b0cd6af4a8691408feb17afb196658291bf186ff106312e5 PORTMON.HLP
390e4d34581afeabd3a15cf0a9e5649102c89a08803661cf495a3de9065eab56 Procmon.exe
3b08535b4add194f5661e1131c8e81af373ca322cf669674cf1272095e5cab95 PsExec.exe
8177dd5c23d016ef12a72ffffedca32dd6fe8813cdc2ab0ee1cf8801de771587 PsGetsid.exe
058a6d07317ff862e2592e4ba94dab5c21452dbb4954fabdd8de200c5a5aaa31 PsInfo.exe
40c2d8d7e58dc4e0af897a6cf6e662a6be914c93d5ec5b6db570e5f4855e4e78 PsLoggedon.exe
6baa38a5709dd9ff3d2c13c5ebbb38fa49594595f06b8376e4003415ea246c06 PsService.exe
2813b6c07d17d25670163e0f66453b42d2f157bf2e42007806ebc6bb9d114acc Pstools.chm
b91364eb19381c7fc66933c0cb1ff48188029938e4f253686834fd87f4c70ecc RAMMap.exe
4455845bcff11d152752e6fc04e1bd7fb5c74ab6a17163b37c2199b73e11b1a0 RegDelNull.exe
637d4d96f73a2ea2f1f22f36fa39345fc0ae8aecd16e5f6b5a2b5f0553a59b1b RootkitRevealer.chm
0b3dfd1d00a0d5da5a88ee2b4734e817ee9c9b13f61eb04dc81660c22051fc27 RootkitRevealer.exe
0f9dd9bf5b25c879cb5a4d8c7e436fdd95736665f3ceed3fd33e78455287378d ShareEnum.exe
4386a9b0539dc4b216525f8acd28972cac5ddccf2db9623b8cc559b53f575072 ShellRunas.exe
66c2a25e728c857ca3b1e6b3f4be6d04d2250a1d2f85256f5a8fc3b429eb3a6b Sysmon.exe
d9c7ee2f08b944466d81b8d87bf645fb91f219b143fb3f2bb1a38b9384357ea6 TCPVIEW.HLP
c9c3f0c4e7519d3a1f4ca427635f994a06613e94cb049f48c10151fab8888183 Tcpvcon.exe
c00d90c50a5e05d270b796645d5f12dee94a31ca94b8ddc90c91af1f9e208850 Tcpview.exe
3a7618d52c9c0b50de7e9d263fd2afc017d0d446393263d8853453e15d00f551 Vmmap.chm
24bc7372df998eeb36789174d6fb80cbcfcb52ac2fa1b9bd29f7b592a1b2aeba Volumeid.exe
3541c0bc3c682552988be4823a3d3656de95d4d83078d53435ddab407f7313a3 WINOBJ.HLP
91b8d19a897cac6cfc638b0c195ee541e78781402e1d59dad7f3d532376f32d2 Winobj.exe
3916bcae09bf0de86d9339ed4b1328d04ed491ae489ee6deb98f8f8677b8723f ZoomIt.exe
61a2792ebaaf9c0b2d9ddc3bd9041e95f632d23e8ae210ed85147dc48a333e81 accesschk.exe
d6f2383412056bbfe4c0b2ead055782008ad4bb5f758c0c582e91c9624f9b5ec adrestore.exe
48eafdbfa0ce0933ed4c3ee18368641292698638af602291420370cbaa830fc9 autoruns.chm
0d32f7b60eae2bf8b0d88b0c76f2f76e899c57384f51b3fe559be5c767e15ee2 autoruns.exe
1a7a13101a57d3144d1de81ddee390219232e3bdbd95d894d29ebd82fa7ff9db autorunsc.exe
3040a653a711f6c5758d1f4212f92e74aae3e6fedf2bb97da01185f3e75f2d76 ctrl2cap.amd.sys
e7f3e98c6e61e7e6fe363855b0ed67d6952683077dcda3a08fd181069b96126d ctrl2cap.exe
aa12befeca6e3cc0a97add308aaf55c4b4a8b0a9504899412bd4b0b3feee56cd ctrl2cap.nt4.sys
8f1688446ebbb0b9673d060cfd94ee6be45abca1adaf66dbbc5014ac4f01eda0 ctrl2cap.nt5.sys
e439d04d29c173ad2b4ffbaa74ce6d2312f0ed9d92ef34abdbc58d41b9b0a1cc dbgview.chm
9a69f747771fb29e3b3f20e6e802ff82280d653dd1cccd2b55b945d237f5652e disk2vhd.exe
8b65a56c6ea1a52d7a91a873f7ace12a28837c1a66fba0bf383309be7b7ca891 diskext.exe
abe5f45cf8aebf881578dd0e0a8df7251af3030106eafef7143a13bdca84ce28 du.exe
efc0894bc8ecdf7709b35e20436a8d2ea0a046fdcec0f0c4385a03bd05833897 efsdump.exe
680327b39d67502103cc9ac8656564529c9a2765adbf563f3145589bcf87681b handle.exe
85809677236f6d51369f1ee5aafc0b010516a3cd9edcc696b5b461c2914eb060 hex2dec.exe
343c0764df76f631702dfd15c52004e65792a1e033f5ae2c8925f35301364a64 junction.exe
980e64020cfceb02652a2a08270b84b974f18f290e9cb798f5d46d3aa3a0ec94 ldmdump.exe
936be7b7a9c3b3abcecc9bf386adb303a593ca00c1da5deeb3a43a6e87cbb3b9 livekd.exe
4296ecb7bd7baf0bfeb364a88b4c87695e5f16f193e5ac954e8a51bd5d58db54 logonsessions.exe
cd1ba0ebe12d024d93ab01d95e8540355c1618c6df65cb5b3a1fa01ee350d0f3 movefile.exe
d994d2e1559bc997670f5ce7fb553f2f31878a1ddbc90793c3b9242db44aadd5 ntfsinfo.exe
19ce7dffdc417dc1ec126d9e1390f05f931b15ac5f67e8b528dfe55b6bfc3d38 pagedfrg.exe
b7b8c0acfdd60fdb826f69d1d6396a0c6d8a6ba712d561b7bd2041767549a03d pagedfrg.hlp
ed7738b38228a7bccbaad3b78e8830f8c57c7a7a9c81f285eff79210d00bd9e8 pendmoves.exe
750aa0302e59da6c3e853c89c76c5f44125394c34cb0a8c70d756b3064f7cdff pipelist.exe
0e848a3911070945cb71803d466ba5a02804957b51b177c52a09ac55280ba6dd portmon.exe
010e32be0f86545e116a8bc3381a8428933eb8789f32c261c81fd5e7857d4a77 procdump.exe
36daeb8eb206d1ca5a0933fffcb07645c9aa68a037d64839d3dbc692c403e76f procexp.chm
94eac5559220793377c3f3b791aa81d853deee34d21467d70799a32eb8d4bd51 procexp.exe
9d9c7e0160537263c60c6ac0941e63f08fce23431aa4eb19acd25ee1e2be20ee procmon.chm
d7961cece831d70f4040438b1e7bcf48973a7d9fbedcbd7aa58bc1d2dffc0623 psfile.exe
3ead613ab5d152c449d7fb6ee9ad04d6ce097b498b0acf2a50b50be8553f1a11 pskill.exe
09174bf3dc391920cc89760d3d1933a0d41e573111897b0eb3c8472758fddbe5 pslist.exe
08a635a6e94423c6404215adfd60a5d48dd0743b0b8f6cea143f738d053d501e psloglist.exe
8564b7e50a5d8c8be617266d938b73ace945ef321e0b5996027b57e95883afb4 pspasswd.exe
c3a77436eddc686b8cf4d8b0c3dc450cf659260aa51cb67081226cd2eb90e2a5 psping.exe
66885c2b1773a6d02c3937e67b94b786fc64af17a7e8bad050be5149092a0117 psshutdown.exe
e47fade3db7bd4b30e8e7f7372694d2f3764d56d069e2a65e9e4f147396f26ca pssuspend.exe
208469d3238653cc03607c08cdb4b5278ec1fde1c543b11cc3ae43a8a0e77a20 psversion.txt
0f2ff4d516aa1d265c13805cebc2fe9042556c1bb7e8eb2e6c289d5255242ac9 readme.txt
422d0087b1628a2eae13bbcf18814bff60f1b2909030ad7debe3d80cecea7549 regjump.exe
5cb91c08bcb6f5adb9f89f1149d1ec93ed85832061f2735dd7d66a979322a329 ru.exe
97d27e1225b472a63c88ac9cfb813019b72598b9dd2d70fe93f324f7d034fb95 sdelete.exe
4d43f079fff299084d6072fca981d640e7cfdd6e0f7ae2c169228664ccd5abae sigcheck.exe
4cd6ed9bc9511094c9431dbfddeaaf9fd3c7881889ef1ed48e5dba8f3c1e7d27 streams.exe
6678f21bedb42c35c10de8efac3eb57fa6bb125f7ea750659c289688c7f16a73 strings.exe
10f124100c9c82ea804e529f994ba4687a3028ae3ff12fc45e7781f47c90504f sync.exe
77af8a6c9a4a806658f55e172ee37b3144a10d596a97d639aff708937c39004d tcpview.chm
a700905b9542e5da4d45f990101c624b8a10b848d6738aeff028b599eac9311b vmmap.exe
6090ff2b6431d86b08af5ba44d4e788893c3838ef6df310f8c20d6f2fce382f7 whois.exe