Welcome
The DeadspAce Investigative Initiative is an independent research collective founded on April 27, 2026, dedicated to studying a dangerous and poorly understood piece of malware known as the DeadspAce.
Our work began when a 2008 game client was recovered from an abandoned FTP server โ and found to contain the DeadspAce embedded and dormant within it. The client has since been flagged by VirusTotal. โ Malware Detected
The Initiative is led by The Founder, The Explorer, and The Operator. We are volunteers. We are not affiliated with any platform, company, or government body.
If you found this page, you may already be part of it.
Recent Updates
Unusual Online Activity โ Community Alert
Multiple community members have flagged coordinated activity from accounts we don't recognize, showing unusual interest in the 2008 client. We are treating this as an active lead. Do not engage with unknown accounts โ report to us.
2008 Client Analysis โ Preliminary Findings
The Operator has completed a first pass of the recovered client. The DeadspAce is present and appears capable of outbound connections. The executable has not been run. Full analysis ongoing. See Case #0003.
Initiative Founded
The DeadspAce Investigative Initiative is officially open. The Founder, The Explorer, and The Operator have committed to a full open investigation. Community researchers welcome. Personal reasons are our own.
the brother is still in the facility. something is still moving out there. the deadspace was the ritual and the ritual is not finished. โ The Explorer, draft never sent
The DeadspAce
The DeadspAce is a piece of malware of unknown origin, first discovered embedded inside a recovered 2008 game client. It has been submitted to and flagged by VirusTotal. โ VirusTotal: Malware โ 38/72 engines
The executable has not been run by the Initiative. All analysis has been conducted in isolated, air-gapped environments by The Operator.
Known Capabilities
| Capability | Confirmed | Notes |
|---|---|---|
| Outbound network connections | โ Yes | Observed in static analysis |
| Site intrusion / unauthorized access | โ Yes | Mechanism under review |
| Self-replication | โ Suspected | Inconclusive so far |
| Unknown function A | โ Unknown | See locked case files |
| Unknown function B | โ Unknown | Do not attempt |
Origin
The 2008 client predates the Initiative by nearly two decades. It is not yet known who embedded the DeadspAce, when exactly, or for what purpose. Recovered files suggest it was not accidental โ someone put it there deliberately and took steps to hide it.
The full origin is under active investigation. See Case #0002.
VirusTotal Report
it doesn't just hack sites. it finds openings that shouldn't exist. like it knows where the walls are thin. โ notes found loose in 2008 client directory, author unknown
Cases
All active investigations are listed below. Community researchers may contribute to any case marked OPEN. Submit tips and findings to our contact address. Locked cases are not open for discussion.
| ID | Name | Status | Lead |
|---|---|---|---|
| #0001 | The 2008 Client โ Recovery | โ Resolved | The Explorer |
| #0002 | The 2008 Client โ Origin | โ Active | The Founder |
| #0003 | DeadspAce โ Technical Analysis | โ Active | The Operator |
| #0004 | Unusual Online Activity โ May 2026 | โ Active | The Founder |
| #0006 | 2014 โ What Happened | โ Locked | Restricted |
Submit a Tip
Have information about the 2008 client, the DeadspAce, or its origins? Post in the forum under the relevant case thread. All submissions are reviewed personally by The Founder or The Explorer.
The Team
The Founder
Co-founder of the Initiative alongside The Explorer, their sibling. The Founder's connection to this investigation is personal .
The Founder oversees case management and community outreach.
The Explorer
Co-founder of the Initiative. Sibling to The Founder, and equally invested in the investigation for the same personal reasons. The Explorer leads active research and document recovery, and was the one who first located the 2008 client on an abandoned FTP server and recognized its significance.
The Operator
Technical lead of the Initiative. A close friend of The Founder and The Explorer, joining from Poland after being contacted early in the investigation. The Operator handles all technical analysis of the DeadspAce, maintains the secure air-gapped archive copy of the 2008 client, and manages the Initiative's infrastructure.
The Operator has never run the executable. The Operator's identity is known only to the siblings.
Contact
Join the Initiative
We welcome researchers, archivists, and anyone with relevant knowledge of the DeadspAce or the 2008 client. Reach out through the forum with a brief note on your background and which case you're interested in. All applicants are vetted personally by The Founder.
A Warning
If you have been approached online by anyone promoting the DeadspAce as something to use, or asking you to run or distribute the 2008 client โ do not engage. Report to us through the forum immediately.
We have reason to believe the activity surrounding this software did not end as cleanly as it may appear. We have evidence something is still ongoing.