DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 A B C D E F G H I K L M N P R S T V W X

⟦539167d85⟧ Bits:30003062 Partner test udgave 12, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30003062 Partner test udgave 12
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Confidence score:  +104/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 26240 ASM86.CMD ⟦574ee9a6a⟧
0 0 768 ASSIGN.DIR ⟦d31d304e1⟧ TextFile
0 0 128 ASSIGN.SYS ⟦9ca3dff99⟧ TextFile
0 0 15744 BDOS.CON ⟦4c8312547⟧
0 0 98048 CCPM.SYS ⟦2433a2aac⟧
0 0 3072 DATE.CMD ⟦498a370c5⟧
0 0 16768 DD604H.SYS ⟦408b35c6b⟧
0 0 16768 DD604V.SYS ⟦bdee6a678⟧
0 0 14080 DD621.SYS ⟦c3492c6d5⟧
0 0 7680 DD750H.SYS ⟦46cce5a2f⟧
0 0 2304 DIR.CMD ⟦7c7084882⟧
0 0 80128 DISKVEDL.CMD ⟦82c893c16⟧
0 0 9600 ED.CMD ⟦4918a195e⟧
0 0 2432 ERA.CMD ⟦b5aa7b2b4⟧
0 0 3840 ERAQ.CMD ⟦0971c3f43⟧
0 0 21760 FILEX.A86 ⟦651a0c044⟧ TextFile
0 0 2688 FILEX.CMD ⟦68906f009⟧
0 0 29184 FUNCTION.CMD ⟦4e37befc1⟧
0 0 39040 GKONFIG.CMD ⟦1b578f7a0⟧
0 0 7936 GRAPHICS.CMD ⟦c5f10f8ab⟧
0 0 7040 HELP.CMD ⟦b93512070⟧
0 0 46208 HELP.HLP ⟦ad8354ea6⟧
0 0 3712 IMENU.MDB ⟦d63060284⟧
0 0 3712 IMENU.MDF ⟦6a6fab270⟧
0 0 28288 INSTAL.CMD ⟦7baca042b⟧
0 0 768 INSTJOB.SUB ⟦a4b42e238⟧ TextFile
0 0 45184 KONFIG.CMD ⟦f8135a530⟧
0 0 39296 LANREL.CMD ⟦a502f1b44⟧
0 0 39552 MATREL.CMD ⟦e05e03088⟧
0 0 18560 MATRELHW.CMD ⟦d994f55f8⟧
0 0 19712 MATRELSW.CMD ⟦21b904476⟧
0 0 18944 MENU.CMD ⟦336bbfb3e⟧
0 0 3712 MENU.MDF ⟦3d0bc46da⟧
0 0 46208 MENUVEDL.CMD ⟦026f2b0c5⟧
0 0 29824 NEDLUK.CMD ⟦767d80a01⟧
0 0 8960 PIP.CMD ⟦ee8e43ffa⟧
0 0 2432 REN.CMD ⟦51a5fd174⟧
0 0 12800 SDIR.CMD ⟦d4842cafd⟧
0 0 7168 SET.CMD ⟦59f532aef⟧
0 0 6784 SHOW.CMD ⟦5d4432c50⟧
0 0 39552 SIOREL.CMD ⟦def220e8f⟧
0 0 128 START1 ⟦c52b8fcb4⟧ TextFile
0 0 128 STARTUP.0 ⟦b2dedd9de⟧ TextFile
0 0 40576 STRREL.CMD ⟦63d9752fb⟧
0 0 3584 SUBMIT.CMD ⟦3ece11c64⟧
0 0 18944 SYSTAT.CMD ⟦098948934⟧
0 0 50432 SYSVEDL.CMD ⟦29db8d172⟧
0 0 1920 TYPE.CMD ⟦0a9dfbeba⟧
0 0 2560 VCMODE.CMD ⟦95f72e9d1⟧
0 0 11136 VINDUE.CMD ⟦f8e000d94⟧
0 0 10880 VMENU.CMD ⟦ca574d9cb⟧
0 0 70912 WDINIT.CMD ⟦b7619e50d⟧
0 0 71552 WDVEDL.CMD ⟦68f699ec1⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-26-7-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 117

Block number width: ok16

   8   409     1   255   207  False
  16     0     8   577     0  False

Block Sizes:
    2048 0x00 +100 -0
    1024 0x00 +7 -93
    4096 0x01 +6 -94
    8192 0x03 +6 -94
   16384 0x07 +6 -94
   32768 0x0f +6 -94
   65536 0x1f +6 -94
     512 0x00 +5 -95
     128 0x00 +3 -97
     256 0x00 +3 -97

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 25, 6, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +104/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 6, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +101/-22
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 25, 1, 25, 6, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +100/-25
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»TEST       «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000100b0849100b0849}
    ProbeDirEnt {status=0x00, name=»ASSIGN  DIR«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=08000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ASSIGN  SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=09000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0a000b000c000d000e000f0010001100}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=12001300140015001600170018001900}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1a001b001c001d001e001f0020002100}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=22002300240025002600270028002900}
    ProbeDirEnt {status=0x00, name=»WDVEDL  CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x2f, al=2a002b002c0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DATE    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=2d002e00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DD604H  SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600}
    ProbeDirEnt {status=0x00, name=»DD604H  SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x03, al=37000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x7e, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»DD604V  SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»DD604V  SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x03, al=70000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»IMENU   MDB«, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=71007200000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DD621   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x6e, al=73007400750076007700780079000000}
    ProbeDirEnt {status=0x00, name=»DD750H  SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=7a007b007c007d000000000000000000}
    ProbeDirEnt {status=0x00, name=»DIR     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=7e007f00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
    ProbeDirEnt {status=0x00, name=»DISKVEDLCMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x72, al=a000a100a200a300a400a500a600a700}
    ProbeDirEnt {status=0x00, name=»ED      CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4b, al=a800a900aa00ab00ac00000000000000}
    ProbeDirEnt {status=0x00, name=»ERA     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=ad00ae00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERAQ    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1e, al=af00b000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FILEX   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=b100b200000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FUNCTIONCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»FUNCTIONCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x64, al=bb00bc00bd00be00bf00c000c1000000}
    ProbeDirEnt {status=0x00, name=»GKONFIG CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
    ProbeDirEnt {status=0x00, name=»GKONFIG CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ca00cb00cc00cd00ce00cf00d000d100}
    ProbeDirEnt {status=0x00, name=»GKONFIG CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x31, al=d200d300d400d5000000000000000000}
    ProbeDirEnt {status=0x00, name=»GRAPHICSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=d600d700d800d9000000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x37, al=da00db00dc00dd000000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x69, al=ee00ef00f000f100f200f300f4000000}
    ProbeDirEnt {status=0x00, name=»IMENU   MDF«, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=f500f600000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INSTAL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f700f800f900fa00fb00fc00fd00fe00}
    ProbeDirEnt {status=0x00, name=»INSTAL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5d, al=ff000001010102010301040100000000}
    ProbeDirEnt {status=0x00, name=»INSTJOB SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=05010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»KONFIG  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=06010701080109010a010b010c010d01}
    ProbeDirEnt {status=0x00, name=»KONFIG  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0e010f01100111011201130114011501}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»KONFIG  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x61, al=16011701180119011a011b011c010000}
    ProbeDirEnt {status=0x00, name=»MENU    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1d011e011f0120012101220123012401}
    ProbeDirEnt {status=0x00, name=»MENU    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x14, al=25012601000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MENU    MDF«, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=27012801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MENUVEDLCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=29012a012b012c012d012e012f013001}
    ProbeDirEnt {status=0x00, name=»MENUVEDLCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=31013201330134013501360137013801}
    ProbeDirEnt {status=0x00, name=»MENUVEDLCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x69, al=39013a013b013c013d013e013f010000}
    ProbeDirEnt {status=0x00, name=»NEDLUK  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=40014101420143014401450146014701}
    ProbeDirEnt {status=0x00, name=»NEDLUK  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x69, al=480149014a014b014c014d014e010000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=4f015001510152015301000000000000}
    ProbeDirEnt {status=0x00, name=»REN     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=54015501000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDIR    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=56015701580159015a015b015c010000}
    ProbeDirEnt {status=0x00, name=»SET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=5d015e015f0160010000000000000000}
    ProbeDirEnt {status=0x00, name=»SHOW    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x35, al=61016201630164010000000000000000}
    ProbeDirEnt {status=0x00, name=»START1     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=65010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STARTUP 0  «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=66010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=67016801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSTAT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=69016a016b016c016d016e016f017001}
    ProbeDirEnt {status=0x00, name=»SYSTAT  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x14, al=71017201000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TYPE    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=73010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VCMODE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=74017501000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VINDUE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x57, al=76017701780179017a017b0100000000}
    ProbeDirEnt {status=0x00, name=»VMENU   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x55, al=7c017d017e017f018001810100000000}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=82018301840185018601870188018901}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8a018b018c018d018e018f0190019101}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x3d, al=92019301940195010000000000000000}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=96019701980199019a019b019c019d01}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9e019f01a001a101a201a30114021502}
    ProbeDirEnt {status=0x00, name=»ASM86   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a401a501a601a701a801a901aa01ab01}
    ProbeDirEnt {status=0x00, name=»ASM86   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x4d, al=ac01ad01ae01af01b001000000000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=b101b201b301b401b501b601b701b801}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b901ba01bb01bc01bd01be01bf01c001}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=c101c201c30100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c401c501c601c701c801c901ca01cb01}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=d401d501d601d7010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d801d901da01db01dc01dd01de01df01}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=e801e901ea01eb010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec01ed01ee01ef01f001f101f201f301}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=f401f501000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f601f701f801f901fa01fb01fc01fd01}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=fe01ff01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=00020102020203020402050206020702}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=080209020a020b020c020d020e020f02}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x35, al=10021102120213020000000000000000}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=16021702180219021a021b021c021d02}
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=1e021f02200221022202230224022502}
  0x0009000 (2, 0, 5)
    ProbeDirEnt {status=0x00, name=»WDINIT  CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x2a, al=26024002410200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2702280229022a022b022c022d022e02}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f023002310232023302340235023602}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=3702380239023a023b023c023d023e02}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0a, al=3f020000000000000000000000000000}
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+ 104 -   0 <Tree 0x0-0x9a000-0x134000>
+ 101 -  22 <Tree 0x0-0x9a000-0x134000>

Full view