DataMuseum.dk

Presents historical artifacts from the history of:

Rational R1000/400

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Rational R1000/400

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦5a0226aa1⟧

    Length: 7168 (0x1c00)
    Notes: 01_class, 97_tag, ADA, R1k_Segment, VAR3, seg_001738

Derivation

└─⟦8527c1e9b⟧ Bits:30000544 8mm tape, Rational 1000, Arrival backup of disks in PAM's R1000
    └─ ⟦5a81ac88f⟧ »Space Info Vol 1« 
        └─⟦this⟧ 

Dot plot

Dot(1) source file

Segmented Heap

{HeapHead 0x00000/0x80}:SegHeapHead first_free_bit = 0x0000d955 max_bits = 0x03ffffff zero = 0x00000000 alloced_bits = 0x0000dfff
{HeadVar3 0x00080/0x2aa}:HeadVar3
    0x000080 [0x00] +0x0000: head_z_000 = 0x80000001 [10000000000000000000000000000001]
    0x0000a0 [0x01] +0x0020: head_segment = 0x00001738 [0000000000000000001011100111000]
    0x0000bf [0x02] +0x003f: head_c_03f = 0x00000001 [00000000000000000000000000000001]
    0x0000df [0x03] +0x005f: head_chains_p → {Thing1 0x0231a/0x10c} [00000000000000000010001100011010]
    0x0000ff [0x04] +0x007f:
    0x000100 [0x05] +0x0080:
    0x00011f [0x06] +0x009f: [00000000000000000000000000000000]
    0x00013f [0x07] +0x00bf: head_c_bf = 0x000000012 [000000000000000000000000000010010]
    0x000160 [0x08] +0x00e0: head_object = 0x0000011a [000000000000000000000100011010]
    0x00017e [0x09] +0x00fe: head_c_fe = 0x00000001 [00000000000000000000000000000001]
    0x00019e [0x0a] +0x011e:
    0x0001be [0x0b] +0x013e:
    0x0001de [0x0c] +0x015e:
    0x0001fe [0x0d] +0x017e:
    0x00021e [0x0e] +0x019e:
    0x00023e [0x0f] +0x01be:
    0x00025e [0x10] +0x01de:
    0x000265 [0x11] +0x01e5: head_variant = 0x3 [11]
    0x000267 [0x12] +0x01e7: hv3_1e7_n = 0x2 [010]
    0x00026a [0x13] +0x01ea:
    0x00028a [0x14] +0x020a: hv3_20a_p → {D300 0x02970/0xc0} [00000000000000000010100101110000]
    0x0002aa [0x15] +0x022a:
    0x0002ea [0x16] +0x026a: hv3_26a_n = 0x0000000000100000 [0000000000000000000000000000000000000000000100000000000000000000]

{R1kSegChunk 0x0032a/0x1ff0}: ===================
    0x00032a +0x0000:                                    0x0 [0x1f80] 0…
    0x0022aa +0x1f80:                           0x1000000000 [0x70] 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000010000 0000000000000000 0000000000000000
{Thing1 0x0231a/0x10c}:Thing1
    0x00231a [0x00] +0x0000: t1_00_n = 0xffffffff005800b400ade001593 [111111111111111111111111111111110000000001011000000000001011010000000000101011011110000000000001010110010011]
    0x002386 [0x01] +0x006c: t1_c1_head_p → {StringIndex 0x02426/0x1e2} [00000000000000000010010000100110]
    0x0023a6 [0x02] +0x008c: t1_c2_last_p → {StringStore 0x0ce84/0x390} [00000000000000001100111010000100]
    0x0023c6 [0x03] +0x00ac: t1_array1_p → {StringIndex 0x0c334/0x6c8} [00000000000000001100001100110100]
    0x0023e6 [0x04] +0x00cc: t1_c2_tail_p → {Thing2 0x0ce44/0x40} [00000000000000001100111001000100]
    0x002406 [0x05] +0x00ec: t1_c1_tail_p → {Thing2 0x0c2f4/0x40} [00000000000000001100001011110100]

{StringIndex 0x02426/0x1e2}:StringIndex x = 0x00000001 y = 0x0000000b
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 000 »'I'«
{StringStore 0x02608/0x368}:StringStore x = 0x00000001 y = 0x00000065
    @0x0264e [0x00] =  $0x0001 »PROFILE«
    @0x0269e [0x01] =  $0x0002 »LOCAL_TO_REMOTE«
    @0x0272e [0x02] =  $0x0003 »FILE_NAME«
    @0x0278e [0x03] =  $0x0004 »LOCAL_ROOF«
    @0x027f6 [0x04] =  $0x0005 »REMOTE_ROOF«
    @0x02866 [0x05] =  $0x0006 »REMOTE_TYPE«
    @0x028d6 [0x06] =  $0x0007 »REMOTE_TO_LOCAL«
{D300 0x02970/0xc0}:D300
    0x002970 [0x00] +0x0000: d300_0 = 0x00000000 [00000000000000000000000000000000]
    0x002990 [0x01] +0x0020: d300_1 = 0x00002a30 [00000000000000000010101000110000]
    0x0029b0 [0x02] +0x0040: d300_2 = 0x00000000 [00000000000000000000000000000000]
    0x0029d0 [0x03] +0x0060: d300_d305 = 0x000030d0 [00000000000000000011000011010000]
    0x0029f0 [0x04] +0x0080: d300_4 = 0x00000000 [00000000000000000000000000000000]
    0x002a10 [0x05] +0x00a0: d300_d301 = 0x00003db0 [00000000000000000011110110110000]

{BitPointerArray 0x02a30/0x6a0}:BitPointerArray

    0x002a30 +0x0000:                                    0x0 [0x6a0] 0…
{D305 0x030d0/0xce0}:D305

    0x0030d0 +0x0000:                                    0x0 [0xce0] 0…
{D301 0x03db0/0xce0}:D301
    0x003e70 [0x06] +0x00c0: ptr_0x6_p → {D302 0x0bb38/0xa0} [00000000000000001011101100111000]
    0x003e90 [0x07] +0x00e0: ptr_0x7_p → {D302 0x05f3c/0xa0} [00000000000000000101111100111100]
    0x003f70 [0x0e] +0x01c0: ptr_0xe_p → {D302 0x0a92c/0xa0} [00000000000000001010100100101100]
    0x003f90 [0x0f] +0x01e0: ptr_0xf_p → {D302 0x06334/0xa0} [00000000000000000110001100110100]
    0x003fd0 [0x11] +0x0220: ptr_0x11_p → {D302 0x0c13c/0xa0} [00000000000000001100000100111100]
    0x004090 [0x17] +0x02e0: ptr_0x17_p → {D302 0x05794/0xa0} [00000000000000000101011110010100]
    0x004190 [0x1f] +0x03e0: ptr_0x1f_p → {D302 0x08b26/0xa0} [00000000000000001000101100100110]
    0x004230 [0x24] +0x0480: ptr_0x24_p → {D302 0x06ffe/0xa0} [00000000000000000110111111111110]
    0x004270 [0x26] +0x04c0: ptr_0x26_p → {D302 0x05178/0xa0} [00000000000000000101000101111000]
    0x004330 [0x2c] +0x0580: ptr_0x2c_p → {D302 0x08d4a/0xa0} [00000000000000001000110101001010]
    0x0043b0 [0x30] +0x0600: ptr_0x30_p → {D302 0x0b944/0xa0} [00000000000000001011100101000100]
    0x004410 [0x33] +0x0660: ptr_0x33_p → {D302 0x04f7c/0xa0} [00000000000000000100111101111100]
    0x004430 [0x34] +0x0680: ptr_0x34_p → {D302 0x071ca/0xa0} [00000000000000000111000111001010]
    0x004450 [0x35] +0x06a0: ptr_0x35_p → {D302 0x0bf70/0xa0} [00000000000000001011111101110000]
    0x0044d0 [0x39] +0x0720: ptr_0x39_p → {D302 0x06960/0xa0} [00000000000000000110100101100000]
    0x004510 [0x3b] +0x0760: ptr_0x3b_p → {D302 0x0537c/0xa0} [00000000000000000101001101111100]
    0x004530 [0x3c] +0x0780: ptr_0x3c_p → {D302 0x0b144/0xa0} [00000000000000001011000101000100]
    0x004590 [0x3f] +0x07e0: ptr_0x3f_p → {D302 0x0cc84/0xa0} [00000000000000001100110010000100]
    0x0045f0 [0x42] +0x0840: ptr_0x42_p → {D302 0x0ca30/0xa0} [00000000000000001100101000110000]
    0x004610 [0x43] +0x0860: ptr_0x43_p → {D302 0x099aa/0xa0} [00000000000000001001100110101010]
    0x004650 [0x45] +0x08a0: ptr_0x45_p → {D302 0x07932/0xa0} [00000000000000000111100100110010]
    0x0047f0 [0x52] +0x0a40: ptr_0x52_p → {D302 0x0d88c/0xa0} [00000000000000001101100010001100]
    0x0048b0 [0x58] +0x0b00: ptr_0x58_p → {D302 0x093ce/0xa0} [00000000000000001001001111001110]
    0x0048d0 [0x59] +0x0b20: ptr_0x59_p → {D302 0x0a760/0xa0} [00000000000000001010011101100000]
    0x004910 [0x5b] +0x0b60: ptr_0x5b_p → {D302 0x08706/0xa0} [00000000000000001000011100000110]
    0x004930 [0x5c] +0x0b80: ptr_0x5c_p → {D302 0x0ab60/0xa0} [00000000000000001010101101100000]
    0x004970 [0x5e] +0x0bc0: ptr_0x5e_p → {D302 0x0a56c/0xa0} [00000000000000001010010101101100]
    0x0049b0 [0x60] +0x0c00: ptr_0x60_p → {D302 0x09e0a/0xa0} [00000000000000001001111000001010]
    0x0049d0 [0x61] +0x0c20: ptr_0x61_p → {D302 0x0d678/0xa0} [00000000000000001101011001111000]
    0x0049f0 [0x62] +0x0c40: ptr_0x62_p → {D302 0x0d47c/0xa0} [00000000000000001101010001111100]
    0x004a50 [0x65] +0x0ca0: ptr_0x65_p → {D302 0x0d248/0xa0} [00000000000000001101001001001000]
    0x004a70 [0x66] +0x0cc0: ptr_0x66_p → {D302 0x06168/0xa0} [00000000000000000110000101101000]

{D303 0x04a90/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04b30/0x34} d303_2 = 0x0001 d303_3 = 0x0000000000000000000
{D304 0x04b30/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04b64/0xa0}:D302 d302_0 = 0x80000007 d302_d303_p → {D303 0x04a90/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000078
{ArrayString 0x04c04/0x78}:ARRAY_STRING[0x1,0x7] = "PROFILE"
{D303 0x04c7c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04d1c/0x34} d303_2 = 0x0002 d303_3 = 0x0000000000000000000
{D304 0x04d1c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04d50/0xa0}:D302 d302_0 = 0x8000000f d302_d303_p → {D303 0x04c7c/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b8
{ArrayString 0x04df0/0xb8}:ARRAY_STRING[0x1,0xf] = "LOCAL_TO_REMOTE"
{D303 0x04ea8/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x04f48/0x34} d303_2 = 0x0003 d303_3 = 0x0000000000000000000
{D304 0x04f48/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x04f7c/0xa0}:D302 d302_0 = 0x80000009 d302_d303_p → {D303 0x04ea8/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000088
{ArrayString 0x0501c/0x88}:ARRAY_STRING[0x1,0x9] = "FILE_NAME"
{D303 0x050a4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05144/0x34} d303_2 = 0x0004 d303_3 = 0x0000000000000000000
{D304 0x05144/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05178/0xa0}:D302 d302_0 = 0x8000000a d302_d303_p → {D303 0x050a4/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000090
{ArrayString 0x05218/0x90}:ARRAY_STRING[0x1,0xa] = "LOCAL_ROOF"
{D303 0x052a8/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05348/0x34} d303_2 = 0x0005 d303_3 = 0x0000000000000000000
{D304 0x05348/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0537c/0xa0}:D302 d302_0 = 0x8000000b d302_d303_p → {D303 0x052a8/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000098
{ArrayString 0x0541c/0x98}:ARRAY_STRING[0x1,0xb] = "REMOTE_ROOF"
{D303 0x054b4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05554/0x34} d303_2 = 0x0006 d303_3 = 0x0000000000000000000
{D304 0x05554/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05588/0xa0}:D302 d302_0 = 0x8000000b d302_d303_p → {D303 0x054b4/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000098
{ArrayString 0x05628/0x98}:ARRAY_STRING[0x1,0xb] = "REMOTE_TYPE"
{D303 0x056c0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05760/0x34} d303_2 = 0x0007 d303_3 = 0x0000000000000000000
{D304 0x05760/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05794/0xa0}:D302 d302_0 = 0x8000000f d302_d303_p → {D303 0x056c0/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b8
{ArrayString 0x05834/0xb8}:ARRAY_STRING[0x1,0xf] = "REMOTE_TO_LOCAL"
{D303 0x058ec/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05d3c/0x34} d303_2 = 0x0008 d303_3 = 0x0000000000000000000
{Thing2 0x0598c/0x40}:Thing2 Chain2 payload_p → {StringStore 0x02608/0x368}
{StringStore 0x059cc/0x370}:StringStore x = 0x00000001 y = 0x00000066
    @0x05a0e [0x00] =  $0x0008 »PUT«
    @0x05a3e [0x01] =  $0x0009 »FROM_LOCAL_FILE«
    @0x05ace [0x02] =  $0x000a »'<'«
    @0x05afe [0x03] =  $0x000b »'I'«
    @0x05b2e [0x04] =  $0x000c »'M'«
    @0x05b5e [0x05] =  $0x000d »'A'«
    @0x05b8e [0x06] =  $0x000e »'G'«
    @0x05bbe [0x07] =  $0x000f »'E'«
    @0x05bee [0x08] =  $0x0010 »'>'«
    @0x05c1e [0x09] =  $0x0011 »TO_REMOTE_FILE«
    @0x05ca6 [0x0a] =  $0x0012 »REMOTE_MACHINE«
{D304 0x05d3c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05d70/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x058ec/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x05e10/0x58}:ARRAY_STRING[0x1,0x3] = "PUT"
{D303 0x05e68/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x05f08/0x34} d303_2 = 0x0009 d303_3 = 0x0000000000000000000
{D304 0x05f08/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x05f3c/0xa0}:D302 d302_0 = 0x8000000f d302_d303_p → {D303 0x05e68/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b8
{ArrayString 0x05fdc/0xb8}:ARRAY_STRING[0x1,0xf] = "FROM_LOCAL_FILE"
{D303 0x06094/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06134/0x34} d303_2 = 0x000a d303_3 = 0x0000000000000000000
{D304 0x06134/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06168/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x06094/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x06208/0x58}:ARRAY_STRING[0x1,0x3] = "'<'"
{D303 0x06260/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06300/0x34} d303_2 = 0x000b d303_3 = 0x0000000000000000000
{D304 0x06300/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06334/0xa0}:D302 d302_0 = 0x80000003 d302_d302_p → {D302 0x05d70/0xa0} d302_d303_p → {D303 0x06260/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x063d4/0x58}:ARRAY_STRING[0x1,0x3] = "'I'"
{D303 0x0642c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06760/0x34} d303_2 = 0x000c d303_3 = 0x0000000000000000000
{Thing2 0x064cc/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x02426/0x1e2}
{StringIndex 0x0650c/0x254}:StringIndex x = 0x00000001 y = 0x0000000e
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 000 »'G'«
{D304 0x06760/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06794/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x0642c/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x06834/0x58}:ARRAY_STRING[0x1,0x3] = "'M'"
{D303 0x0688c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0692c/0x34} d303_2 = 0x000d d303_3 = 0x0000000000000000000
{D304 0x0692c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06960/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x0688c/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x06a00/0x58}:ARRAY_STRING[0x1,0x3] = "'A'"
{D303 0x06a58/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06af8/0x34} d303_2 = 0x000e d303_3 = 0x0000000000000000000
{D304 0x06af8/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06b2c/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x06a58/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x06bcc/0x58}:ARRAY_STRING[0x1,0x3] = "'G'"
{D303 0x06c24/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x06fca/0x34} d303_2 = 0x000f d303_3 = 0x0000000000000000000
{Thing2 0x06cc4/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x0650c/0x254} next_p → {Thing2 0x064cc/0x40}
{StringIndex 0x06d04/0x2c6}:StringIndex x = 0x00000001 y = 0x00000011
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 00f »'G'«
  [$0x000f]  0x037b0 010 »'E'«
  [$0x0010]  0x037e0 011 »'>'«
  [$0x0011]  0x03810 000 »TO_REMOTE_FILE«
{D304 0x06fca/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x06ffe/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x06c24/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x0709e/0x58}:ARRAY_STRING[0x1,0x3] = "'E'"
{D303 0x070f6/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x07196/0x34} d303_2 = 0x0010 d303_3 = 0x0000000000000000000
{D304 0x07196/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x071ca/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x070f6/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x0726a/0x58}:ARRAY_STRING[0x1,0x3] = "'>'"
{D303 0x072c2/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x07362/0x34} d303_2 = 0x0011 d303_3 = 0x0000000000000000000
{D304 0x07362/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x07396/0xa0}:D302 d302_0 = 0x8000000e d302_d303_p → {D303 0x072c2/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b0
{ArrayString 0x07436/0xb0}:ARRAY_STRING[0x1,0xe] = "TO_REMOTE_FILE"
{D303 0x074e6/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x078fe/0x34} d303_2 = 0x0012 d303_3 = 0x0000000000000000000
{Thing2 0x07586/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x06d04/0x2c6} next_p → {Thing2 0x06cc4/0x40}
{StringIndex 0x075c6/0x338}:StringIndex x = 0x00000001 y = 0x00000014
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 00f »'G'«
  [$0x000f]  0x037b0 010 »'E'«
  [$0x0010]  0x037e0 011 »'>'«
  [$0x0011]  0x03810 012 »TO_REMOTE_FILE«
  [$0x0012]  0x03898 013 »REMOTE_MACHINE«
  [$0x0013]  0x05798 014 »USERNAME«
  [$0x0014]  0x057f0 000 »PASSWORD«
{D304 0x078fe/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x07932/0xa0}:D302 d302_0 = 0x8000000e d302_d302_p → {D302 0x05588/0xa0} d302_d303_p → {D303 0x074e6/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b0
{ArrayString 0x079d2/0xb0}:ARRAY_STRING[0x1,0xe] = "REMOTE_MACHINE"
{D303 0x07a82/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x07eda/0x34} d303_2 = 0x0013 d303_3 = 0x0000000000000000000
{Thing2 0x07b22/0x40}:Thing2 Chain2 payload_p → {StringStore 0x059cc/0x370} next_p → {Thing2 0x0598c/0x40}
{StringStore 0x07b62/0x378}:StringStore x = 0x00000001 y = 0x00000067
    @0x07ba6 [0x00] =  $0x0013 »USERNAME«
    @0x07bfe [0x01] =  $0x0014 »PASSWORD«
    @0x07c56 [0x02] =  $0x0015 »ACCOUNT«
    @0x07ca6 [0x03] =  $0x0016 »REMOTE_DIRECTORY«
    @0x07d3e [0x04] =  $0x0017 »APPEND_TO_FILE«
    @0x07dc6 [0x05] =  $0x0018 »FALSE«
    @0x07e06 [0x06] =  $0x0019 »TRANSFER_TYPE«
{D304 0x07eda/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x07f0e/0xa0}:D302 d302_0 = 0x80000008 d302_d303_p → {D303 0x07a82/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x07fae/0x80}:ARRAY_STRING[0x1,0x8] = "USERNAME"
{D303 0x0802e/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x080ce/0x34} d303_2 = 0x0014 d303_3 = 0x0000000000000000000
{D304 0x080ce/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x08102/0xa0}:D302 d302_0 = 0x80000008 d302_d303_p → {D303 0x0802e/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x081a2/0x80}:ARRAY_STRING[0x1,0x8] = "PASSWORD"
{D303 0x08222/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x086d2/0x34} d303_2 = 0x0015 d303_3 = 0x0000000000000000000
{Thing2 0x082c2/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x075c6/0x338} next_p → {Thing2 0x07586/0x40}
{StringIndex 0x08302/0x3d0}:StringIndex x = 0x00000001 y = 0x00000018
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 00f »'G'«
  [$0x000f]  0x037b0 010 »'E'«
  [$0x0010]  0x037e0 011 »'>'«
  [$0x0011]  0x03810 012 »TO_REMOTE_FILE«
  [$0x0012]  0x03898 013 »REMOTE_MACHINE«
  [$0x0013]  0x05798 014 »USERNAME«
  [$0x0014]  0x057f0 015 »PASSWORD«
  [$0x0015]  0x05848 016 »ACCOUNT«
  [$0x0016]  0x05898 017 »REMOTE_DIRECTORY«
  [$0x0017]  0x05930 018 »APPEND_TO_FILE«
  [$0x0018]  0x059b8 000 »FALSE«
{D304 0x086d2/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x08706/0xa0}:D302 d302_0 = 0x80000007 d302_d302_p → {D302 0x07396/0xa0} d302_d303_p → {D303 0x08222/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000078
{ArrayString 0x087a6/0x78}:ARRAY_STRING[0x1,0x7] = "ACCOUNT"
{D303 0x0881e/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x088be/0x34} d303_2 = 0x0016 d303_3 = 0x0000000000000000000
{D304 0x088be/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x088f2/0xa0}:D302 d302_0 = 0x80000010 d302_d303_p → {D303 0x0881e/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000c0
{ArrayString 0x08992/0xc0}:ARRAY_STRING[0x1,0x10] = "REMOTE_DIRECTORY"
{D303 0x08a52/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x08af2/0x34} d303_2 = 0x0017 d303_3 = 0x0000000000000000000
{D304 0x08af2/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x08b26/0xa0}:D302 d302_0 = 0x8000000e d302_d303_p → {D303 0x08a52/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000b0
{ArrayString 0x08bc6/0xb0}:ARRAY_STRING[0x1,0xe] = "APPEND_TO_FILE"
{D303 0x08c76/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x08d16/0x34} d303_2 = 0x0018 d303_3 = 0x0000000000000000000
{D304 0x08d16/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x08d4a/0xa0}:D302 d302_0 = 0x80000005 d302_d302_p → {D302 0x04d50/0xa0} d302_d303_p → {D303 0x08c76/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000068
{ArrayString 0x08dea/0x68}:ARRAY_STRING[0x1,0x5] = "FALSE"
{D303 0x08e52/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0939a/0x34} d303_2 = 0x0019 d303_3 = 0x0000000000000000000
{Thing2 0x08ef2/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x08302/0x3d0} next_p → {Thing2 0x082c2/0x40}
{StringIndex 0x08f32/0x468}:StringIndex x = 0x00000001 y = 0x0000001c
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 00f »'G'«
  [$0x000f]  0x037b0 010 »'E'«
  [$0x0010]  0x037e0 011 »'>'«
  [$0x0011]  0x03810 012 »TO_REMOTE_FILE«
  [$0x0012]  0x03898 013 »REMOTE_MACHINE«
  [$0x0013]  0x05798 014 »USERNAME«
  [$0x0014]  0x057f0 015 »PASSWORD«
  [$0x0015]  0x05848 016 »ACCOUNT«
  [$0x0016]  0x05898 017 »REMOTE_DIRECTORY«
  [$0x0017]  0x05930 018 »APPEND_TO_FILE«
  [$0x0018]  0x059b8 019 »FALSE«
  [$0x0019]  0x059f8 01a »TRANSFER_TYPE«
  [$0x001a]  0x07228 01b »TRANSFER_MODE«
  [$0x001b]  0x072a8 01c »TRANSFER_STRUCTURE«
  [$0x001c]  0x07350 000 »SEND_PORT«
{D304 0x0939a/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x093ce/0xa0}:D302 d302_0 = 0x8000000d d302_d303_p → {D303 0x08e52/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a8
{ArrayString 0x0946e/0xa8}:ARRAY_STRING[0x1,0xd] = "TRANSFER_TYPE"
{D303 0x09516/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x09976/0x34} d303_2 = 0x001a d303_3 = 0x0000000000000000000
{Thing2 0x095b6/0x40}:Thing2 Chain2 payload_p → {StringStore 0x07b62/0x378} next_p → {Thing2 0x07b22/0x40}
{StringStore 0x095f6/0x380}:StringStore x = 0x00000001 y = 0x00000068
    @0x09636 [0x00] =  $0x001a »TRANSFER_MODE«
    @0x096b6 [0x01] =  $0x001b »TRANSFER_STRUCTURE«
    @0x0975e [0x02] =  $0x001c »SEND_PORT«
    @0x097be [0x03] =  $0x001d »RESPONSE«
    @0x09816 [0x04] =  $0x001e »GET«
    @0x09846 [0x05] =  $0x001f »FROM_REMOTE_FILE«
    @0x098de [0x06] =  $0x0020 »TO_LOCAL_FILE«
{D304 0x09976/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x099aa/0xa0}:D302 d302_0 = 0x8000000d d302_d303_p → {D303 0x09516/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a8
{ArrayString 0x09a4a/0xa8}:ARRAY_STRING[0x1,0xd] = "TRANSFER_MODE"
{D303 0x09af2/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x09b92/0x34} d303_2 = 0x001b d303_3 = 0x0000000000000000000
{D304 0x09b92/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x09bc6/0xa0}:D302 d302_0 = 0x80000012 d302_d303_p → {D303 0x09af2/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d0
{ArrayString 0x09c66/0xd0}:ARRAY_STRING[0x1,0x12] = "TRANSFER_STRUCTURE"
{D303 0x09d36/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x09dd6/0x34} d303_2 = 0x001c d303_3 = 0x0000000000000000000
{D304 0x09dd6/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x09e0a/0xa0}:D302 d302_0 = 0x80000009 d302_d303_p → {D303 0x09d36/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000088
{ArrayString 0x09eaa/0x88}:ARRAY_STRING[0x1,0x9] = "SEND_PORT"
{D303 0x09f32/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0a538/0x34} d303_2 = 0x001d d303_3 = 0x0000000000000000000
{Thing2 0x09fd2/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x08f32/0x468} next_p → {Thing2 0x08ef2/0x40}
{StringIndex 0x0a012/0x526}:StringIndex x = 0x00000001 y = 0x00000021
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 00f »'G'«
  [$0x000f]  0x037b0 010 »'E'«
  [$0x0010]  0x037e0 011 »'>'«
  [$0x0011]  0x03810 012 »TO_REMOTE_FILE«
  [$0x0012]  0x03898 013 »REMOTE_MACHINE«
  [$0x0013]  0x05798 014 »USERNAME«
  [$0x0014]  0x057f0 015 »PASSWORD«
  [$0x0015]  0x05848 016 »ACCOUNT«
  [$0x0016]  0x05898 017 »REMOTE_DIRECTORY«
  [$0x0017]  0x05930 018 »APPEND_TO_FILE«
  [$0x0018]  0x059b8 019 »FALSE«
  [$0x0019]  0x059f8 01a »TRANSFER_TYPE«
  [$0x001a]  0x07228 01b »TRANSFER_MODE«
  [$0x001b]  0x072a8 01c »TRANSFER_STRUCTURE«
  [$0x001c]  0x07350 01d »SEND_PORT«
  [$0x001d]  0x073b0 01e »RESPONSE«
  [$0x001e]  0x07408 01f »GET«
  [$0x001f]  0x07438 020 »FROM_REMOTE_FILE«
  [$0x0020]  0x074d0 021 »TO_LOCAL_FILE«
  [$0x0021]  0x089c0 000 »STORE«
{D304 0x0a538/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0a56c/0xa0}:D302 d302_0 = 0x80000008 d302_d302_p → {D302 0x07f0e/0xa0} d302_d303_p → {D303 0x09f32/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x0a60c/0x80}:ARRAY_STRING[0x1,0x8] = "RESPONSE"
{D303 0x0a68c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0a72c/0x34} d303_2 = 0x001e d303_3 = 0x0000000000000000000
{D304 0x0a72c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0a760/0xa0}:D302 d302_0 = 0x80000003 d302_d302_p → {D302 0x06b2c/0xa0} d302_d303_p → {D303 0x0a68c/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x0a800/0x58}:ARRAY_STRING[0x1,0x3] = "GET"
{D303 0x0a858/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0a8f8/0x34} d303_2 = 0x001f d303_3 = 0x0000000000000000000
{D304 0x0a8f8/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0a92c/0xa0}:D302 d302_0 = 0x80000010 d302_d302_p → {D302 0x09bc6/0xa0} d302_d303_p → {D303 0x0a858/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000c0
{ArrayString 0x0a9cc/0xc0}:ARRAY_STRING[0x1,0x10] = "FROM_REMOTE_FILE"
{D303 0x0aa8c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0ab2c/0x34} d303_2 = 0x0020 d303_3 = 0x0000000000000000000
{D304 0x0ab2c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0ab60/0xa0}:D302 d302_0 = 0x8000000d d302_d303_p → {D303 0x0aa8c/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a8
{ArrayString 0x0ac00/0xa8}:ARRAY_STRING[0x1,0xd] = "TO_LOCAL_FILE"
{D303 0x0aca8/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0b110/0x34} d303_2 = 0x0021 d303_3 = 0x0000000000000000000
{Thing2 0x0ad48/0x40}:Thing2 Chain2 payload_p → {StringStore 0x095f6/0x380} next_p → {Thing2 0x095b6/0x40}
{StringStore 0x0ad88/0x388}:StringStore x = 0x00000001 y = 0x00000069
    @0x0adce [0x00] =  $0x0021 »STORE«
    @0x0ae0e [0x01] =  $0x0022 »RETRIEVE«
    @0x0ae66 [0x02] =  $0x0023 »PUT_SET«
    @0x0aeb6 [0x03] =  $0x0024 »FROM_LOCAL_FILE_SET«
    @0x0af66 [0x04] =  $0x0025 »'$'«
    @0x0af96 [0x05] =  $0x0026 »GET_SET«
    @0x0afe6 [0x06] =  $0x0027 »FROM_REMOTE_FILE_SET«
    @0x0b09e [0x07] =  $0x0028 »GET_LIST«
{D304 0x0b110/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0b144/0xa0}:D302 d302_0 = 0x80000005 d302_d303_p → {D303 0x0aca8/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000068
{ArrayString 0x0b1e4/0x68}:ARRAY_STRING[0x1,0x5] = "STORE"
{D303 0x0b24c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0b910/0x34} d303_2 = 0x0022 d303_3 = 0x0000000000000000000
{Thing2 0x0b2ec/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x0a012/0x526} next_p → {Thing2 0x09fd2/0x40}
{StringIndex 0x0b32c/0x5e4}:StringIndex x = 0x00000001 y = 0x00000026
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 00f »'G'«
  [$0x000f]  0x037b0 010 »'E'«
  [$0x0010]  0x037e0 011 »'>'«
  [$0x0011]  0x03810 012 »TO_REMOTE_FILE«
  [$0x0012]  0x03898 013 »REMOTE_MACHINE«
  [$0x0013]  0x05798 014 »USERNAME«
  [$0x0014]  0x057f0 015 »PASSWORD«
  [$0x0015]  0x05848 016 »ACCOUNT«
  [$0x0016]  0x05898 017 »REMOTE_DIRECTORY«
  [$0x0017]  0x05930 018 »APPEND_TO_FILE«
  [$0x0018]  0x059b8 019 »FALSE«
  [$0x0019]  0x059f8 01a »TRANSFER_TYPE«
  [$0x001a]  0x07228 01b »TRANSFER_MODE«
  [$0x001b]  0x072a8 01c »TRANSFER_STRUCTURE«
  [$0x001c]  0x07350 01d »SEND_PORT«
  [$0x001d]  0x073b0 01e »RESPONSE«
  [$0x001e]  0x07408 01f »GET«
  [$0x001f]  0x07438 020 »FROM_REMOTE_FILE«
  [$0x0020]  0x074d0 021 »TO_LOCAL_FILE«
  [$0x0021]  0x089c0 022 »STORE«
  [$0x0022]  0x08a00 023 »RETRIEVE«
  [$0x0023]  0x08a58 024 »PUT_SET«
  [$0x0024]  0x08aa8 025 »FROM_LOCAL_FILE_SET«
  [$0x0025]  0x08b58 026 »'$'«
  [$0x0026]  0x08b88 000 »GET_SET«
{D304 0x0b910/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0b944/0xa0}:D302 d302_0 = 0x80000008 d302_d303_p → {D303 0x0b24c/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x0b9e4/0x80}:ARRAY_STRING[0x1,0x8] = "RETRIEVE"
{D303 0x0ba64/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0bb04/0x34} d303_2 = 0x0023 d303_3 = 0x0000000000000000000
{D304 0x0bb04/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0bb38/0xa0}:D302 d302_0 = 0x80000007 d302_d302_p → {D302 0x04b64/0xa0} d302_d303_p → {D303 0x0ba64/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000078
{ArrayString 0x0bbd8/0x78}:ARRAY_STRING[0x1,0x7] = "PUT_SET"
{D303 0x0bc50/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0bcf0/0x34} d303_2 = 0x0024 d303_3 = 0x0000000000000000000
{D304 0x0bcf0/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0bd24/0xa0}:D302 d302_0 = 0x80000013 d302_d302_p → {D302 0x088f2/0xa0} d302_d303_p → {D303 0x0bc50/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000d8
{ArrayString 0x0bdc4/0xd8}:ARRAY_STRING[0x1,0x13] = "FROM_LOCAL_FILE_SET"
{D303 0x0be9c/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0bf3c/0x34} d303_2 = 0x0025 d303_3 = 0x0000000000000000000
{D304 0x0bf3c/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0bf70/0xa0}:D302 d302_0 = 0x80000003 d302_d303_p → {D303 0x0be9c/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000058
{ArrayString 0x0c010/0x58}:ARRAY_STRING[0x1,0x3] = "'$'"
{D303 0x0c068/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0c108/0x34} d303_2 = 0x0026 d303_3 = 0x0000000000000000000
{D304 0x0c108/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0c13c/0xa0}:D302 d302_0 = 0x80000007 d302_d303_p → {D303 0x0c068/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000078
{ArrayString 0x0c1dc/0x78}:ARRAY_STRING[0x1,0x7] = "GET_SET"
{D303 0x0c254/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0c9fc/0x34} d303_2 = 0x0027 d303_3 = 0x0000000000000000000
{Thing2 0x0c2f4/0x40}:Thing2 Chain1 payload_p → {StringIndex 0x0b32c/0x5e4} next_p → {Thing2 0x0b2ec/0x40}
{StringIndex 0x0c334/0x6c8}:StringIndex x = 0x00000001 y = 0x0000002c
  [$0x0001]  0x00240 002 »PROFILE«
  [$0x0002]  0x00290 003 »LOCAL_TO_REMOTE«
  [$0x0003]  0x00320 004 »FILE_NAME«
  [$0x0004]  0x00380 005 »LOCAL_ROOF«
  [$0x0005]  0x003e8 006 »REMOTE_ROOF«
  [$0x0006]  0x00458 007 »REMOTE_TYPE«
  [$0x0007]  0x004c8 008 »REMOTE_TO_LOCAL«
  [$0x0008]  0x03600 009 »PUT«
  [$0x0009]  0x03630 00a »FROM_LOCAL_FILE«
  [$0x000a]  0x036c0 00b »'<'«
  [$0x000b]  0x036f0 00c »'I'«
  [$0x000c]  0x03720 00d »'M'«
  [$0x000d]  0x03750 00e »'A'«
  [$0x000e]  0x03780 00f »'G'«
  [$0x000f]  0x037b0 010 »'E'«
  [$0x0010]  0x037e0 011 »'>'«
  [$0x0011]  0x03810 012 »TO_REMOTE_FILE«
  [$0x0012]  0x03898 013 »REMOTE_MACHINE«
  [$0x0013]  0x05798 014 »USERNAME«
  [$0x0014]  0x057f0 015 »PASSWORD«
  [$0x0015]  0x05848 016 »ACCOUNT«
  [$0x0016]  0x05898 017 »REMOTE_DIRECTORY«
  [$0x0017]  0x05930 018 »APPEND_TO_FILE«
  [$0x0018]  0x059b8 019 »FALSE«
  [$0x0019]  0x059f8 01a »TRANSFER_TYPE«
  [$0x001a]  0x07228 01b »TRANSFER_MODE«
  [$0x001b]  0x072a8 01c »TRANSFER_STRUCTURE«
  [$0x001c]  0x07350 01d »SEND_PORT«
  [$0x001d]  0x073b0 01e »RESPONSE«
  [$0x001e]  0x07408 01f »GET«
  [$0x001f]  0x07438 020 »FROM_REMOTE_FILE«
  [$0x0020]  0x074d0 021 »TO_LOCAL_FILE«
  [$0x0021]  0x089c0 022 »STORE«
  [$0x0022]  0x08a00 023 »RETRIEVE«
  [$0x0023]  0x08a58 024 »PUT_SET«
  [$0x0024]  0x08aa8 025 »FROM_LOCAL_FILE_SET«
  [$0x0025]  0x08b58 026 »'$'«
  [$0x0026]  0x08b88 027 »GET_SET«
  [$0x0027]  0x08bd8 028 »FROM_REMOTE_FILE_SET«
  [$0x0028]  0x08c90 029 »GET_LIST«
  [$0x0029]  0x0aab8 02a »REMOTE_FILE_LIST«
  [$0x002a]  0x0ab50 02b »STORE_SET«
  [$0x002b]  0x0abb0 02c »RETRIEVE_SET«
  [$0x002c]  0x0ac28 000 »RETRIEVE_LIST«
{D304 0x0c9fc/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0ca30/0xa0}:D302 d302_0 = 0x80000014 d302_d303_p → {D303 0x0c254/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000e0
{ArrayString 0x0cad0/0xe0}:ARRAY_STRING[0x1,0x14] = "FROM_REMOTE_FILE_SET"
{D303 0x0cbb0/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0cc50/0x34} d303_2 = 0x0028 d303_3 = 0x0000000000000000000
{D304 0x0cc50/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0cc84/0xa0}:D302 d302_0 = 0x80000008 d302_d302_p → {D302 0x08102/0xa0} d302_d303_p → {D303 0x0cbb0/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000080
{ArrayString 0x0cd24/0x80}:ARRAY_STRING[0x1,0x8] = "GET_LIST"
{D303 0x0cda4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0d214/0x34} d303_2 = 0x0029 d303_3 = 0x0000000000000000000
{Thing2 0x0ce44/0x40}:Thing2 Chain2 payload_p → {StringStore 0x0ad88/0x388} next_p → {Thing2 0x0ad48/0x40}
{StringStore 0x0ce84/0x390}:StringStore x = 0x00000001 y = 0x0000006a
    @0x0cec6 [0x00] =  $0x0029 »REMOTE_FILE_LIST«
    @0x0cf5e [0x01] =  $0x002a »STORE_SET«
    @0x0cfbe [0x02] =  $0x002b »RETRIEVE_SET«
    @0x0d036 [0x03] =  $0x002c »RETRIEVE_LIST«
{D304 0x0d214/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0d248/0xa0}:D302 d302_0 = 0x80000010 d302_d303_p → {D303 0x0cda4/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000c0
{ArrayString 0x0d2e8/0xc0}:ARRAY_STRING[0x1,0x10] = "REMOTE_FILE_LIST"
{D303 0x0d3a8/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0d448/0x34} d303_2 = 0x002a d303_3 = 0x0000000000000000000
{D304 0x0d448/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0d47c/0xa0}:D302 d302_0 = 0x80000009 d302_d303_p → {D303 0x0d3a8/0xa0} d302_3 = 0x00000040 d302_4 = 0x00000088
{ArrayString 0x0d51c/0x88}:ARRAY_STRING[0x1,0x9] = "STORE_SET"
{D303 0x0d5a4/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0d644/0x34} d303_2 = 0x002b d303_3 = 0x0000000000000000000
{D304 0x0d644/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0d678/0xa0}:D302 d302_0 = 0x8000000c d302_d302_p → {D302 0x06794/0xa0} d302_d303_p → {D303 0x0d5a4/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a0
{ArrayString 0x0d718/0xa0}:ARRAY_STRING[0x1,0xc] = "RETRIEVE_SET"
{D303 0x0d7b8/0xa0}:D303 d303_0 = 0x12d3000000 d303_1_p → {D304 0x0d858/0x34} d303_2 = 0x002c d303_3 = 0x0000000000000000000
{D304 0x0d858/0x34}:D304 d304_0 = 0x8228338000001
{D302 0x0d88c/0xa0}:D302 d302_0 = 0x8000000d d302_d302_p → {D302 0x0bd24/0xa0} d302_d303_p → {D303 0x0d7b8/0xa0} d302_3 = 0x00000040 d302_4 = 0x000000a8
{ArrayString 0x0d92c/0xa8}:ARRAY_STRING[0x1,0xd] = "RETRIEVE_LIST"