Source

swconquest-loader / laa_notes.txt

laa in pe images
----------------

f=open(bin.exe)
verify magic [MZ]
goto(base+0x3C) --pe header pointer location
peheader=read(as 16bit unsigned int, two octets) --read pointer address

goto(base+peheader) --now you're on the real header
verify magic [PE 00]  -- not counting seek+4
goto(base+peheader+0x4+0x12) --head over the characteristics bitfield
                   ^magic,^offset
				   
characteristics=read(as 16 bit unsigned int, two octets)
-----------------

that's it. Now you've the bitfield.
check w/AND or add w/OR using the following flag.

IMAGE_FILE_LARGE_ADDRESS_AWARE
0x0020|2^5

http://msdn.microsoft.com/en-us/library/ms680349(v=vs.85).aspx

save, you're good to go.
Tip: Filter by directory path e.g. /media app.js to search for public/media/app.js.
Tip: Use camelCasing e.g. ProjME to search for ProjectModifiedEvent.java.
Tip: Filter by extension type e.g. /repo .js to search for all .js files in the /repo directory.
Tip: Separate your search with spaces e.g. /ssh pom.xml to search for src/ssh/pom.xml.
Tip: Use ↑ and ↓ arrow keys to navigate and return to view the file.
Tip: You can also navigate files with Ctrl+j (next) and Ctrl+k (previous) and view the file with Ctrl+o.
Tip: You can also navigate files with Alt+j (next) and Alt+k (previous) and view the file with Alt+o.