[Xbox 360] Msp spoofer updated for dash 17559


Hello boys and girls, I come to share with you this little updated code to download games
from the xbox 360 marketplace, a few days ago I used this, it worked perfectly.

Some people may already have this updated method in private and decided not to release it. I do not care if they
get angry because with the lasting method in most stealth servers there are more modders in xbox live. with good reason
why not release this? Have they already sold it to others?.

well, however try and enjoy this and please intend to give proper credit to this. as in most junk stealth servers they used
to use this as if it were an exclusivity and implying to others that they discovered this by themselves hahahaha.
Just to clarify, I am not trying to offend anyone with this stealth garbage, many of these people simply do not know what
it does or how it works and they are the most insulting to others who need help.

"Note: it only works with xbox 360 games, I mean this will not work with xbla, dlc, themes, player images,
use this at your own risk I am not responsible for kv bans."



I just whipped this up tonight. Before using make sure you turn off all stealth server colors/Hud Stuff first. It works but there is a trick to it. After finding game you want. You have to enable MSP spoof from Hud guide. Then quickly press purchase, keep purchase guide open & wait for about 4-5 minutes. After, select change pay option. $2500 should be showing in MS account. Just select & download game. I just tested it with COD 2


20 views to the attachment, I wonder how many people added that to their server. I have seen more jobs in Latin servers where they have that (msp v1) of $ 2500 and they assure that it is new function by themselves. lmao :rolleyes:


here's an update for this

BYTE xampatch1[0x1C] = {
0x38, 0x80, 0x00, 0x05, 0x80, 0x63, 0x00, 0x1C, 0x90, 0x83, 0x00, 0x04,
0x38, 0x80, 0x09, 0xC4, 0x90, 0x83, 0x00, 0x08, 0x38, 0x60, 0x00, 0x00,
0x4E, 0x80, 0x00, 0x20

memcpy((PVOID)0x8168A6F8, xampatch1, 0x1C); // xam.xex 17559
*(DWORD*)(0x818E98AC) = 0x60000000; // xam.xex 17559
*(DWORD*)(0x818E9BE4) = 0x60000000; // xam.xex 17559
*(DWORD*)(0x818EE414) = 0x480000C8; // xam.xex 17559
*(DWORD*)(0x9015D860) = 0x60000000; // Guide.MP.Purchase.xex 17559
*(DWORD*)(0x9015D924) = 0x60000000; // Guide.MP.Purchase.xex 17559
*(DWORD*)(0x9015D900) = 0x60000000; // Guide.MP.Purchase.xex 17559
*(DWORD*)(0x9015D868) = 0x60000000; // Guide.MP.Purchase.xex 17559