|  | DataMuseum.dkPresents historical artifacts from the history of: RegneCentralen RC759 "Piccoline" | 
This is an automatic "excavation" of a thematic subset of
 See our Wiki for more about RegneCentralen RC759 "Piccoline" Excavated with: AutoArchaeologist - Free & Open Source Software. | 
top - metricsIndex: 5 B C G I L M N P R S T V X
    Length: 1261568 (0x134000)
    Description: Bits:30004229/disk2.imd SW1400 CCP/M 86 Distributionsdiskette 3.1a
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CP/M-fs(1024_2048_0x0_512_*1+1_2:0_76:1)
Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_512_*1+1_2:0_76:1
Confidence score:  +96/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact | 
|---|---|---|---|---|
| 0 | 0 | 15744 | BDOS.CON | ⟦bceab8e24⟧ | 
| 0 | 0 | 41984 | BESKED.CMD | ⟦4ed544a99⟧ | 
| 0 | 0 | 146816 | CCPM.SYS | ⟦7c8ffee17⟧ | 
| 0 | 0 | 102272 | CCPM1.SYS | ⟦5ed249fa1⟧ | 
| 0 | 0 | 112256 | CCPM4.SYS | ⟦2ca317e83⟧ | 
| 0 | 0 | 5504 | CIO.CON | ⟦1f71bae28⟧ | 
| 0 | 0 | 640 | CLOCK.RSP | ⟦9b24ff61d⟧ | 
| 0 | 0 | 52608 | GENCCPM.CMD | ⟦ec5584118⟧ | 
| 0 | 0 | 384 | GENINST.SUB | ⟦99d7441ca⟧ TextFile | 
| 0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ | 
| 0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ | 
| 0 | 0 | 18432 | LOGON.CMD | ⟦b1d51b0d1⟧ | 
| 0 | 0 | 6144 | MEM.CON | ⟦272ffa888⟧ | 
| 0 | 0 | 1792 | MINTERN.CMD | ⟦6f10a2e4e⟧ | 
| 0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ | 
| 0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ | 
| 0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ | 
| 0 | 0 | 17792 | NETDRV.RSP | ⟦001d6c69e⟧ | 
| 0 | 0 | 128 | NETKONF | ⟦97a2d453d⟧ TextFile | 
| 0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ | 
| 0 | 0 | 16384 | NETON.CMD | ⟦fb959619e⟧ | 
| 0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ | 
| 0 | 0 | 51584 | NETVEDL.CMD | ⟦b9e311192⟧ | 
| 0 | 0 | 3328 | PIN759.RSP | ⟦0538d9e1a⟧ | 
| 0 | 0 | 17280 | PINTERN.CMD | ⟦3100e53f9⟧ | 
| 0 | 0 | 8960 | PIP.CMD | ⟦e5b107109⟧ | 
| 0 | 0 | 37888 | POSTHUS.CMD | ⟦1b189b7b6⟧ | 
| 0 | 0 | 35200 | RCADDNET.CMD | ⟦cbc8968e2⟧ | 
| 0 | 0 | 5120 | RCDSP.CMD | ⟦b95b71ff5⟧ | 
| 0 | 0 | 46976 | RCGENNET.CMD | ⟦2233d1336⟧ | 
| 0 | 0 | 1920 | RCNIOS.CMD | ⟦1a810ffb0⟧ | 
| 0 | 0 | 16384 | RCSPL.CMD | ⟦60f369d2a⟧ | 
| 0 | 0 | 27264 | RNET.CMD | ⟦faa04a7ab⟧ | 
| 0 | 0 | 33408 | RSNET.CMD | ⟦d576ef0e3⟧ | 
| 0 | 0 | 7552 | RTM.CON | ⟦7b18901b9⟧ | 
| 0 | 0 | 640 | SCROLL.RSP | ⟦f3378549e⟧ | 
| 0 | 0 | 19712 | SNET.CMD | ⟦33a2affd9⟧ | 
| 0 | 0 | 42240 | SPOOL.CMD | ⟦e6b957ea9⟧ | 
| 0 | 0 | 256 | STDKONF | ⟦d33af0ee7⟧ TextFile | 
| 0 | 0 | 3584 | SUBMIT.CMD | ⟦146b2ae19⟧ | 
| 0 | 0 | 5632 | SUP.CON | ⟦58d06b598⟧ | 
| 0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ | 
| 0 | 0 | 7424 | TMP759.RSP | ⟦aa4022f9a⟧ | 
| 0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ | 
| 0 | 0 | 32256 | XIOS1.CON | ⟦d29edbd7b⟧ | 
| 0 | 0 | 36224 | XIOS4.CON | ⟦2caa56f69⟧ | 
Geometry: [[0, 0, 1], [76, 1, 8]]
First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records
Credible directory tracks:
   (2, 0)  0x8000 26-26-26-26-3-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2
Total credibility: 113
Block number width: ok16
   8   390     1   255   216  False
  16     0     8   565     0  False
Block Sizes:
    2048 0x00 +96 -0
    1024 0x00 +8 -88
    4096 0x01 +7 -89
    8192 0x03 +7 -89
   16384 0x07 +7 -89
   32768 0x0f +7 -89
   65536 0x1f +7 -89
     512 0x00 +4 -92
     256 0x00 +3 -93
     128 0x00 +2 -94
Candidate interleaves in order of directory credibility:
Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 25, 2, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 2, 1, 25, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-11
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 25, 1, 25, 2, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +96/-15
From the beastiarium: CpmFSCr16   +0/-0
File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Rel3-1 D2/4«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000fc0c1501fc0c1501}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x6d, al=380039003a003b003c003d003e000000}
    ProbeDirEnt {status=0x00, name=»NETKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x1f, al=70007100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=8a008b008c008d008e008f0090009100}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=a200a300a400a500a600a700a800a900}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x7b, al=b200b300b400b500b600b700b800b900}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ba00bb00bc00bd00be00bf00c000c100}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=ca00cb00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x7c, al=d400d500d600d700d800d900da00db00}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=dc00dd00de0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e700e800e900ea00eb00ec00ed00ee00}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ef00f000f100f200f300f400f500f600}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=f700f800f900fa00fb00000000000000}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=0c010d010e0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1701180119011a011b011c011d011e01}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1f012001210122012301000000000000}
    ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=24010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250126012701280129012a012b012c01}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=2d010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x13, al=46014701000000000000000000000000}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=480149014a014b014c01000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=4d014e01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4f015001510152015301540155015601}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5701580159015a015b015c015d015e01}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5f016001610162016301640165016601}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=67016801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=69016a016b016c016d016e016f017001}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=79017a01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6f, al=8b018c018d018e018f01900191010000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=92019301940195019601970198019901}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=9a019b019c019d019e019f0100000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a001a101a201a301a401a501a601a701}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=a801a901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa01ab01ac01ad01ae01af01b001b101}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b201b301b401b501b601b701b801b901}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=ba010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=bb010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=c4010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=c501c601c701c801c901ca01cb01cc01}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=d501d601d701d801d901da0100000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=db01dc01dd01de01df01e001e101e201}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=e3010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e401e501e601e701e801e901ea01eb01}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=ec01ed01ee01ef010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f801f901fa01fb01fc01fd01fe01ff01}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=00020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=09020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=0a020b020c020d020000000000000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0e020f02100211021202130214021502}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=16021702180200000000000000000000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=19021a021b0200000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=1c021d021e0200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=1f022002000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=21022202230224022502260227022802}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0b, al=29020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=2a022b02000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=2c020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=2d022e022f0230020000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=31020000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=32023302000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=34020000000000000000000000000000}
  0x0009000 (2, 0, 5)
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=35020000000000000000000000000000}
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  96 -   0 <Tree 0x0-0x9a000-0x134000>
+  96 -  11 <Tree 0x0-0x9a000-0x134000>