Back to media list / Zurück zur Medienliste

EvasiveAction.1.img: DOS/MBR boot sector, code offset 0x3e+2, OEM-ID "(wIU)IHC" cached by Windows 9M, root entries 224, sectors 2880 (volumes <=32 MB), sectors/FAT 9, sectors/track 18, serial number 0x176712eb, label: "EACT1 ", FAT (12 bit), followed by FAT
├── [-r-xr-xr-x root     root               4 Mar 30  1994]  DI1.QPZ
├── [-r-xr-xr-x root     root          411570 Mar 30  1994]  EACT01.TZF
├── [-r-xr-xr-x root     root          287725 Mar 30  1994]  EACT02.TZF
├── [-r-xr-xr-x root     root          130998 Mar 30  1994]  EACT03.TZF
├── [-r-xr-xr-x root     root          193433 Mar 30  1994]  EACT04.TZF
├── [-r-xr-xr-x root     root           80489 Mar 30  1994]  EACT05.TZF
├── [-r-xr-xr-x root     root          116109 Mar 30  1994]  EACT06.TZF
├── [-r-xr-xr-x root     root             352 Mar 25  1994]  INSTALL.BAT
├── [-r-xr-xr-x root     root           36501 Mar 28  1994]  UK.EXE
└── [-r-xr-xr-x root     root           36509 Mar 28  1994]  US.EXE


0 directories, 10 files


tree v1.8.0 © 1996 - 2018 by Steve Baker and Thomas Moore
HTML output hacked and copyleft © 1998 by Francesc Rocher
JSON output hacked and copyleft © 2014 by Florian Sesser
Charsets / OS/2 support © 2001 by Kyosuke Tokoro