Another method is to use dir /s" but tree has lines and it looks funky.tree /fModificationAn attacker may want to modify data on the compromised host, data such as log files or web pages etc....There is a good little text editor that has been native to windows for many years called Edit.