|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C G I L M N P R S T V X
Length: 1261568 (0x134000)
Description: Bits:30004107/disk2.imd SW1400 CCP/M 86 Distributionsdiskette 3.1
Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_160)
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature: 1024_2048_0x0_*1+1_2:0_76:1_160
Confidence score: +122/-0
Sector size: 1024
Block size: 2048
Directory entries: 160
Block number size: 16
Extent-mask: 0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact |
|---|---|---|---|---|
| 0 | 0 | 15744 | BDOS.CON | ⟦29527f612⟧ |
| 0 | 0 | 41984 | BESKED.CMD | ⟦4ed544a99⟧ |
| 0 | 0 | 146816 | CCPM.SYS | ⟦4c4c1ae5e⟧ |
| 0 | 0 | 102272 | CCPM1.SYS | ⟦f0accac84⟧ |
| 0 | 0 | 112256 | CCPM4.SYS | ⟦d0681ea02⟧ |
| 0 | 0 | 5504 | CIO.CON | ⟦2978aa9f5⟧ |
| 0 | 0 | 640 | CLOCK.RSP | ⟦9b24ff61d⟧ |
| 0 | 0 | 52608 | GENCCPM.CMD | ⟦88da7febd⟧ |
| 0 | 0 | 384 | GENINST.SUB | ⟦99d7441ca⟧ TextFile |
| 0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
| 0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
| 0 | 0 | 18432 | LOGON.CMD | ⟦125709716⟧ |
| 0 | 0 | 6144 | MEM.CON | ⟦58dce6dfa⟧ |
| 0 | 0 | 1792 | MINTERN.CMD | ⟦6f10a2e4e⟧ |
| 0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
| 0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
| 0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
| 0 | 0 | 17792 | NETDRV.RSP | ⟦001d6c69e⟧ |
| 0 | 0 | 128 | NETKONF | ⟦97a2d453d⟧ TextFile |
| 0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
| 0 | 0 | 16384 | NETON.CMD | ⟦e55271ee9⟧ |
| 0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
| 0 | 0 | 51584 | NETVEDL.CMD | ⟦b9e311192⟧ |
| 0 | 0 | 3328 | PIN759.RSP | ⟦0538d9e1a⟧ |
| 0 | 0 | 17280 | PINTERN.CMD | ⟦3100e53f9⟧ |
| 0 | 0 | 8960 | PIP.CMD | ⟦e5b107109⟧ |
| 0 | 0 | 37888 | POSTHUS.CMD | ⟦1b189b7b6⟧ |
| 0 | 0 | 35200 | RCADDNET.CMD | ⟦cbc8968e2⟧ |
| 0 | 0 | 5120 | RCDSP.CMD | ⟦b95b71ff5⟧ |
| 0 | 0 | 46976 | RCGENNET.CMD | ⟦2233d1336⟧ |
| 0 | 0 | 1920 | RCNIOS.CMD | ⟦1a810ffb0⟧ |
| 0 | 0 | 16384 | RCSPL.CMD | ⟦60f369d2a⟧ |
| 0 | 0 | 27264 | RNET.CMD | ⟦8f05f5de3⟧ |
| 0 | 0 | 33408 | RSNET.CMD | ⟦a680eabbb⟧ |
| 0 | 0 | 7552 | RTM.CON | ⟦128c4fa8e⟧ |
| 0 | 0 | 640 | SCROLL.RSP | ⟦f3378549e⟧ |
| 0 | 0 | 19712 | SNET.CMD | ⟦e3a195892⟧ |
| 0 | 0 | 42240 | SPOOL.CMD | ⟦e6b957ea9⟧ |
| 0 | 0 | 256 | STDKONF | ⟦d33af0ee7⟧ TextFile |
| 0 | 0 | 3584 | SUBMIT.CMD | ⟦146b2ae19⟧ |
| 0 | 0 | 5632 | SUP.CON | ⟦a66e527ee⟧ |
| 0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
| 0 | 0 | 7424 | TMP759.RSP | ⟦aa4022f9a⟧ |
| 0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
| 0 | 0 | 32256 | XIOS1.CON | ⟦d29edbd7b⟧ |
| 0 | 0 | 36224 | XIOS4.CON | ⟦2caa56f69⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]]
First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records
Credible directory tracks:
(2, 0) 0x8000 25-25-25-25-2-1-1-1
(2, 1) 0xa000 1-1-1-1-1-1-1-1
Total credibility: 97
Block number width: ok16
8 390 1 255 216 False
16 0 8 565 0 False
Block Sizes:
2048 0x00 +96 -0
1024 0x00 +8 -88
4096 0x01 +7 -89
8192 0x03 +7 -89
16384 0x07 +7 -89
32768 0x0f +7 -89
65536 0x1f +7 -89
512 0x00 +4 -92
256 0x00 +3 -93
128 0x00 +2 -94
Candidate interleaves in order of directory credibility:
Penalty Name Order Resulting dir order
0 normal-1 (1-2-3-4-5-6-7-8) [24, 24, 24, 24, 1] +122/-0
25 normal-2 (1-3-5-7-2-4-6-8) [24, 24, 1, 0, 24, 24] +105/-11
50 normal-3 (1-4-7-2-5-8-3-6) [24, 24, 0, 24, 1, 0, 24] +111/-15
From the beastiarium: CpmFSCr16 +0/-0
File & label names found:
0x0008000 (2, 0, 1)
ProbeDirEnt {status=0x20, name=»Rel3-1 D2/4«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000fc0c1501fc0c1501}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x6d, al=380039003a003b003c003d003e000000}
ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3f000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x1f, al=70007100000000000000000000000000}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=8a008b008c008d008e008f0090009100}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=a200a300a400a500a600a700a800a900}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100}
0x0008400 (2, 0, 2)
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x7b, al=b200b300b400b500b600b700b800b900}
ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ba00bb00bc00bd00be00bf00c000c100}
ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=ca00cb00000000000000000000000000}
ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x7c, al=d400d500d600d700d800d900da00db00}
ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=dc00dd00de0000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ef00f000f100f200f300f400f500f600}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=f700f800f900fa00fb00000000000000}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=0c010d010e0100000000000000000000}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1701180119011a011b011c011d011e01}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1f012001210122012301000000000000}
ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=24010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250126012701280129012a012b012c01}
ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=2d010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x13, al=46014701000000000000000000000000}
0x0008800 (2, 0, 3)
ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=480149014a014b014c01000000000000}
ProbeDirEnt {status=0x00, name=»SUBMIT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=4d014e01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4f015001510152015301540155015601}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=67016801000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=69016a016b016c016d016e016f017001}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=79017a01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6f, al=8b018c018d018e018f01900191010000}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a001a101a201a301a401a501a601a701}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=a801a901000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa01ab01ac01ad01ae01af01b001b101}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b201b301b401b501b601b701b801b901}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=ba010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=bb010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301}
ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=c4010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=c501c601c701c801c901ca01cb01cc01}
ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401}
0x0008c00 (2, 0, 4)
ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d501d601d701d801d901da0100000000}
ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=db01dc01dd01de01df01e001e101e201}
ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=e3010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e401e501e601e701e801e901ea01eb01}
ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=ec01ed01ee01ef010000000000000000}
ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701}
ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f801f901fa01fb01fc01fd01fe01ff01}
ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=00020000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=09020000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=0a020b020c020d020000000000000000}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0e020f02100211021202130214021502}
ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=16021702180200000000000000000000}
ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=19021a021b0200000000000000000000}
ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=1c021d021e0200000000000000000000}
ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=1f022002000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=21022202230224022502260227022802}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=29020000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=2a022b02000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=2c020000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=2d022e022f0230020000000000000000}
ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=31020000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»PIN759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=32023302000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=34020000000000000000000000000000}
0x0009000 (2, 0, 5)
ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=35020000000000000000000000000000}
* 122 - 0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 111 - 15 [1, 4, 7, 2, 5, 8, 3, 6]
+ 105 - 11 [1, 3, 5, 7, 2, 4, 6, 8]