|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 0 5 B C D E F G I K L M N P R S T X h p q s
Length: 1261568 (0x134000)
Description: Bits:30004361/disk2.imd SW1458 Concurrent DOS Distributionsdiskette 5.0
Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
Notes: CP/M-fs(1024_2048_0x0_512_*2+1+2_2:0_76:1), CP/M-fs(1024_2048_0x0_512_*3+1+2+3_2:0_76:1)
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature: 1024_2048_0x0_512_*2+1+2_2:0_76:1
Confidence score: +88/-15
Sector size: 1024
Block size: 2048
Directory entries: 512
Block number size: 16
Extent-mask: 0x00
Sector-interleave: 1, 3, 5, 7, 2, 4, 6, 8
Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact |
|---|---|---|---|---|
| 0 | 0 | 24064 | BDOS.CON | ⟦d59d9a655⟧ |
| 0 | 0 | 280192 | CCPM.SYS | ⟦2bd3da4e5⟧ |
| 0 | 0 | 7936 | CIO.CON | ⟦1e9784089⟧ |
| 0 | 0 | 640 | CLOCK.RSP | ⟦da2c4fd73⟧ |
| 0 | 0 | 60288 | GENSYS.CMD | ⟦f4f7dc52d⟧ |
| 0 | 0 | 1024 | GENSYS.CNF | ⟦46c7ade49⟧ 0xe5[0x400] |
| 0 | 0 | 28544 | IMC.CMD | ⟦e1ec1818f⟧ |
| 0 | 0 | 9856 | IMCSTART.CMD | ⟦a8b2dc678⟧ |
| 0 | 0 | 9856 | IMCSTOP.CMD | ⟦bc28b5dee⟧ |
| 0 | 0 | 38784 | LANREL.CMD | ⟦77989cece⟧ |
| 0 | 0 | 28928 | LIST.CMD | ⟦f1d35a5e7⟧ |
| 0 | 0 | 39680 | MATREL.CMD | ⟦222cb0f9e⟧ |
| 0 | 0 | 18560 | MATRELHW.CMD | ⟦c23c91ee3⟧ |
| 0 | 0 | 19712 | MATRELSW.CMD | ⟦903f8f0a3⟧ |
| 0 | 0 | 6912 | MEM.CON | ⟦f0b2639ec⟧ |
| 0 | 0 | 34688 | NETDRV.RSP | ⟦60f3f8f9b⟧ |
| 0 | 0 | 1024 | NETSYS.CNF | ⟦e5858fbd8⟧ |
| 0 | 0 | 3072 | PIN759.RSP | ⟦fc45148a7⟧ |
| 0 | 0 | 4864 | RCDSP.CMD | ⟦5d772e667⟧ |
| 0 | 0 | 58880 | RCGENDOS.CMD | ⟦8ac78b2fb⟧ |
| 0 | 0 | 45824 | RCGENNET.CMD | ⟦157654ece⟧ |
| 0 | 0 | 1920 | RCNIOS.CMD | ⟦94ca288e9⟧ |
| 0 | 0 | 16896 | RCSPL.CMD | ⟦1d9a631cb⟧ |
| 0 | 0 | 7424 | REDIR.RSP | ⟦87138b3b0⟧ |
| 0 | 0 | 29056 | RNET.CMD | ⟦866e1c4bc⟧ |
| 0 | 0 | 35456 | RSNET.CMD | ⟦27a424ead⟧ |
| 0 | 0 | 7808 | RTM.CON | ⟦b31ddbf63⟧ |
| 0 | 0 | 6272 | SCROLL.RSP | ⟦ea92766d5⟧ |
| 0 | 0 | 38528 | SIOREL.CMD | ⟦ad1aa735a⟧ |
| 0 | 0 | 18560 | SNET.CMD | ⟦af70db4a8⟧ |
| 0 | 0 | 42368 | SPOOL.CMD | ⟦f4384dcb0⟧ |
| 0 | 0 | 9216 | SUP.CON | ⟦aa994abb9⟧ |
| 0 | 0 | 3328 | SYSDAT.CON | ⟦d950fa981⟧ |
| 0 | 0 | 49024 | SYSVEDL.CMD | ⟦a63691385⟧ |
| 0 | 0 | 36736 | TMP759.RSP | ⟦e20c2c4b0⟧ |
| 0 | 0 | 38528 | XIOS.CON | ⟦2e68a24e9⟧ |
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature: 1024_2048_0x0_512_*3+1+2+3_2:0_76:1
Confidence score: +88/-15
Sector size: 1024
Block size: 2048
Directory entries: 512
Block number size: 16
Extent-mask: 0x00
Sector-interleave: 1, 4, 7, 2, 5, 8, 3, 6
Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact |
|---|---|---|---|---|
| 0 | 0 | 24064 | BDOS.CON | ⟦3e3a7f8f7⟧ |
| 0 | 0 | 280192 | CCPM.SYS | ⟦696c79b34⟧ |
| 0 | 0 | 7936 | CIO.CON | ⟦c570ee909⟧ |
| 0 | 0 | 640 | CLOCK.RSP | ⟦fa5d82f35⟧ |
| 0 | 0 | 60288 | GENSYS.CMD | ⟦a3fc71689⟧ |
| 0 | 0 | 1024 | GENSYS.CNF | ⟦5f70bf18a⟧ 0x00[0x400] |
| 0 | 0 | 28544 | IMC.CMD | ⟦c7e141052⟧ |
| 0 | 0 | 9856 | IMCSTART.CMD | ⟦238d53bd0⟧ |
| 0 | 0 | 9856 | IMCSTOP.CMD | ⟦1f54af6ba⟧ |
| 0 | 0 | 38784 | LANREL.CMD | ⟦6312c2175⟧ |
| 0 | 0 | 28928 | LIST.CMD | ⟦cd06963fe⟧ |
| 0 | 0 | 39680 | MATREL.CMD | ⟦f343ac279⟧ |
| 0 | 0 | 18560 | MATRELHW.CMD | ⟦f2ce1585e⟧ |
| 0 | 0 | 19712 | MATRELSW.CMD | ⟦195d93e91⟧ |
| 0 | 0 | 6912 | MEM.CON | ⟦cf8f67bce⟧ |
| 0 | 0 | 34688 | NETDRV.RSP | ⟦440af8ff8⟧ |
| 0 | 0 | 1024 | NETSYS.CNF | ⟦e5858fbd8⟧ |
| 0 | 0 | 3072 | PIN759.RSP | ⟦35a42813b⟧ |
| 0 | 0 | 4864 | RCDSP.CMD | ⟦98c9b77ad⟧ |
| 0 | 0 | 58880 | RCGENDOS.CMD | ⟦9174a15b8⟧ |
| 0 | 0 | 45824 | RCGENNET.CMD | ⟦d918cd0c1⟧ |
| 0 | 0 | 1920 | RCNIOS.CMD | ⟦145a48d46⟧ |
| 0 | 0 | 16896 | RCSPL.CMD | ⟦20e365c54⟧ |
| 0 | 0 | 7424 | REDIR.RSP | ⟦d53050633⟧ |
| 0 | 0 | 29056 | RNET.CMD | ⟦3633bdcdb⟧ |
| 0 | 0 | 35456 | RSNET.CMD | ⟦d51e5e448⟧ |
| 0 | 0 | 7808 | RTM.CON | ⟦38ee61c38⟧ |
| 0 | 0 | 6272 | SCROLL.RSP | ⟦ce2b1bcb8⟧ |
| 0 | 0 | 38528 | SIOREL.CMD | ⟦4ae29cab4⟧ |
| 0 | 0 | 18560 | SNET.CMD | ⟦6c131f9ff⟧ |
| 0 | 0 | 42368 | SPOOL.CMD | ⟦599e388ac⟧ |
| 0 | 0 | 9216 | SUP.CON | ⟦21c21012b⟧ |
| 0 | 0 | 3328 | SYSDAT.CON | ⟦bbeb785a4⟧ |
| 0 | 0 | 49024 | SYSVEDL.CMD | ⟦c56941081⟧ |
| 0 | 0 | 36736 | TMP759.RSP | ⟦d53a3adc5⟧ |
| 0 | 0 | 38528 | XIOS.CON | ⟦cf1cd678a⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]]
First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records
Credible directory tracks:
(2, 0) 0x8000 26-26-26-18-2-2-2-2
(2, 1) 0xa000 2-2-2-2-2-2-2-2
Total credibility: 104
Block number width: ok16
8 343 1 255 214 False
16 0 8 542 0 False
Block Sizes:
2048 0x00 +87 -0
1024 0x00 +4 -83
4096 0x01 +4 -83
8192 0x03 +4 -83
16384 0x07 +4 -83
32768 0x0f +4 -83
65536 0x1f +4 -83
512 0x00 +1 -86
128 0x00 +0 -87
256 0x00 +0 -87
Candidate interleaves in order of directory credibility:
Penalty Name Order Resulting dir order
0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 17, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +87/-0
24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 17, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +88/-15
48 normal-3 (1-4-7-2-5-8-3-6) [25, 17, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +88/-15
From the beastiarium: CpmFSCr16 +0/-0
File & label names found:
0x0008000 (2, 0, 1)
ProbeDirEnt {status=0x20, name=»Disk 2/3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000210f0800210f0800}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x0d, al=90000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=91009200930094009500960097009800}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=99009a009b009c009d009e009f00a000}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a100a200a300a400a500a600a700a800}
ProbeDirEnt {status=0x00, name=»GENSYS CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x57, al=a900aa00ab00ac00ad00ae0000000000}
ProbeDirEnt {status=0x00, name=»GENSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=af000000000000000000000000000000}
0x0008400 (2, 0, 2)
ProbeDirEnt {status=0x00, name=»NETSYS CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b0000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b100b200b300b400b500b600b700b800}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b900ba00bb00bc00bd00be00bf00c000}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800}
ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=c900ca00cb00cc00cd00000000000000}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce00cf00d000d100d200d300d400d500}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d600d700d800d900da00db00dc00dd00}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=de00df00e000e100e200e300e4000000}
ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e5000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=ee00ef00000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f000f100f200f300f400f500f600f700}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f800f900fa00fb00fc00fd00fe00ff00}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=00010101000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=02010301040105010601070108010901}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0a010b010c010d010e010f0110010000}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=11011201130114011501160117011801}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=19011a011b011c010000000000000000}
ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1d011e011f0120010000000000000000}
ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=21012201230124010000000000000000}
ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=25012601270128010000000000000000}
ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=29012a012b012c012d01000000000000}
ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=2e012f01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30013101320133013401350136013701}
0x0008800 (2, 0, 3)
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=40014101420100000000000000000000}
ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=43010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4401450146014701480149014a014b01}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4c014d014e014f015001510152015301}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=54010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»PIN759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=55015601000000000000000000000000}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=67016801000000000000000000000000}
ProbeDirEnt {status=0x00, name=»REDIR RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=69016a016b016c010000000000000000}
ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=6d016e016f0170010000000000000000}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=79017a017b017c017d017e017f018001}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4b, al=81018201830184018501000000000000}
ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01}
ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=8e010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=8f019001910100000000000000000000}
ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
ProbeDirEnt {status=0x00, name=»LIST CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x62, al=9a019b019c019d019e019f01a0010000}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a101a201a301a401a501a601a701a801}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a901aa01ab01ac01ad01ae01af01b001}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=b101b201b301b401b501b601b701b801}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b901ba01bb01bc01bd01be01bf01c001}
0x0008c00 (2, 0, 4)
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c101c201c301c401c501c601c701c801}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=c901ca01cb0100000000000000000000}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc01cd01ce01cf01d001d101d201d301}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d401d501d601d701d801d901da01db01}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=dc01dd01de01df010000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=e801e901000000000000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ea01eb01ec01ed01ee01ef01f001f101}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=f201f301000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fc01fd01fe01ff010002010202020302}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=04020502060200000000000000000000}
ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0702080209020a020b020c020d020e02}
ProbeDirEnt {status=0x00, name=»IMC CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=0f021002110212021302140200000000}
ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=15021602170218021902000000000000}
ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=1a021b021c021d021e02000000000000}
0x0009000 (2, 0, 5)
0x0009400 (2, 0, 6)
0x0009800 (2, 0, 7)
0x0009c00 (2, 0, 8)
0x000a000 (2, 1, 1)
0x000a400 (2, 1, 2)
0x000a800 (2, 1, 3)
0x000ac00 (2, 1, 4)
0x000b000 (2, 1, 5)
0x000b400 (2, 1, 6)
0x000b800 (2, 1, 7)
0x000bc00 (2, 1, 8)
+ 88 - 15 <Tree 0x0-0x9a000-0x134000>
+ 88 - 15 <Tree 0x0-0x9a000-0x134000>
+ 87 - 0 <Tree 0x0-0x9a000-0x134000>