# Updating byond-tracy ## strings Exists in a lot of places. DetectEncoding is decent. 515.1603 signature: A1 ? ? ? ? 68 ? ? ? ? 53 ![](https://i.imgur.com/iLY0miP.png) ![image](https://hackmd.io/_uploads/rkAm_ghv6.png) ## miscs Weird one. Usually close to strings. I go down starting from strings_len (at the moment, always 4 bytes after) until I find something with a lot of references. ![image](https://hackmd.io/_uploads/Syk2Yg3wp.png) ~~I searched `8B 0D ? ? ? ? 89 34 81` (on 515.1603), which takes you to `mov ecx, miscs`~~ ## procdefs Usually close to miscs. Search "procs". There are two call sites. One is next to some formatting, the other one is the one you want. It is above, eventually, `push procdefs` ![](https://i.imgur.com/rGPjdjq.png) 515.1603 signature for the push: `FF 35 ? ? ? ? FF D6 8B D0` ## exec_proc "calling %s()\n" 515.1603 signature: 53 8B DC 83 EC 08 83 E4 F8 ![](https://i.imgur.com/inwmWwG.png) ## server_tick Search "Stick.cpp" 515.1603 signature: 55 8B EC 83 EC 10 83 3D ? ? ? ? ? 75 06 ![](https://i.imgur.com/mczeqrr.png) ## send_maps Decompile server_tick. Look for the last caller of TimeLib::Ticks(). send_maps() is the one above it. ![image](https://hackmd.io/_uploads/HJ6m3x3DT.png) Hex-Rays of send_maps: ![](https://i.imgur.com/fXB2OIK.png)