๐Ÿ“„ File Properties โ€” 2008_client_BACKUP โœ•
Filename:client_2008_FINAL.exe
Type:Executable (flagged)
Origin:Unknown FTP โ€” recovered 2026
Build date:2008-03-14 v0.9.4
Flagged by:VirusTotal โ€” MALWARE

Hidden flag:TRUE
Embedded item:DeadspAce (active)
Checksum:4F19BB2C07

Note:Do not execute. Contact The Operator.
deadspace-ii.net โ€” founded 2026-04-27
โ˜… DeadspAce Investigative Initiative โ€” est. April 27, 2026  โ€”  2008 client recovered and under analysis by The Operator  โ€”  [VirusTotal: MALWARE โ€” DeadspAce detected โ€” do not execute]  โ€”  โ˜… Unusual online activity flagged โ€” see Cases  โ€”  โ˜… Community researchers welcome โ€” visit Contact page  โ€” 

Welcome

The DeadspAce Investigative Initiative is an independent research collective founded on April 27, 2026, dedicated to studying a dangerous and poorly understood piece of malware known as the DeadspAce.

Our work began when a 2008 game client was recovered from an abandoned FTP server โ€” and found to contain the DeadspAce embedded and dormant within it. The client has since been flagged by VirusTotal. โš  Malware Detected

The Initiative is led by The Founder, The Explorer, and The Operator. We are volunteers. We are not affiliated with any platform, company, or government body.

If you found this page, you may already be part of it.

Recent Updates

2026-05-14

Unusual Online Activity โ€” Community Alert

Multiple community members have flagged coordinated activity from accounts we don't recognize, showing unusual interest in the 2008 client. We are treating this as an active lead. Do not engage with unknown accounts โ€” report to us.

2026-05-02

2008 Client Analysis โ€” Preliminary Findings

The Operator has completed a first pass of the recovered client. The DeadspAce is present and appears capable of outbound connections. The executable has not been run. Full analysis ongoing. See Case #0003.

2026-04-27

Initiative Founded

The DeadspAce Investigative Initiative is officially open. The Founder, The Explorer, and The Operator have committed to a full open investigation. Community researchers welcome. Personal reasons are our own.

the brother is still in the facility. something is still moving out there. the deadspace was the ritual and the ritual is not finished. โ€” The Explorer, draft never sent

The DeadspAce

The DeadspAce is a piece of malware of unknown origin, first discovered embedded inside a recovered 2008 game client. It has been submitted to and flagged by VirusTotal. โš  VirusTotal: Malware โ€” 38/72 engines

The executable has not been run by the Initiative. All analysis has been conducted in isolated, air-gapped environments by The Operator.

Known Capabilities

CapabilityConfirmedNotes
Outbound network connectionsโœ” YesObserved in static analysis
Site intrusion / unauthorized accessโœ” YesMechanism under review
Self-replicationโš  SuspectedInconclusive so far
Unknown function Aโš  UnknownSee locked case files
Unknown function Bโš  UnknownDo not attempt

Origin

The 2008 client predates the Initiative by nearly two decades. It is not yet known who embedded the DeadspAce, when exactly, or for what purpose. Recovered files suggest it was not accidental โ€” someone put it there deliberately and took steps to hide it.

The full origin is under active investigation. See Case #0002.

VirusTotal Report

Hashd34d5p4c3-2008-CLIENT-FINAL
Detectionโš  Malware โ€” 38/72 engines
Full reportHeld by The Operator. Do not attempt to locate or run the original executable.

it doesn't just hack sites. it finds openings that shouldn't exist. like it knows where the walls are thin. โ€” notes found loose in 2008 client directory, author unknown

Cases

All active investigations are listed below. Community researchers may contribute to any case marked OPEN. Submit tips and findings to our contact address. Locked cases are not open for discussion.

IDNameStatusLead
#0001The 2008 Client โ€” Recoveryโœ” ResolvedThe Explorer
#0002The 2008 Client โ€” Originโš  ActiveThe Founder
#0003DeadspAce โ€” Technical Analysisโš  ActiveThe Operator
#0004Unusual Online Activity โ€” May 2026โš  ActiveThe Founder
#00062014 โ€” What Happenedโš  LockedRestricted

Submit a Tip

Have information about the 2008 client, the DeadspAce, or its origins? Post in the forum under the relevant case thread. All submissions are reviewed personally by The Founder or The Explorer.

The Team

The Founder

Co-founder of the Initiative alongside The Explorer, their sibling. The Founder's connection to this investigation is personal .

The Founder oversees case management and community outreach.

The Explorer

Co-founder of the Initiative. Sibling to The Founder, and equally invested in the investigation for the same personal reasons. The Explorer leads active research and document recovery, and was the one who first located the 2008 client on an abandoned FTP server and recognized its significance.

The Operator

Technical lead of the Initiative. A close friend of The Founder and The Explorer, joining from Poland after being contacted early in the investigation. The Operator handles all technical analysis of the DeadspAce, maintains the secure air-gapped archive copy of the 2008 client, and manages the Initiative's infrastructure.

The Operator has never run the executable. The Operator's identity is known only to the siblings.

Contact

Join the Initiative

We welcome researchers, archivists, and anyone with relevant knowledge of the DeadspAce or the 2008 client. Reach out through the forum with a brief note on your background and which case you're interested in. All applicants are vetted personally by The Founder.

A Warning

If you have been approached online by anyone promoting the DeadspAce as something to use, or asking you to run or distribute the 2008 client โ€” do not engage. Report to us through the forum immediately.

We have reason to believe the activity surrounding this software did not end as cleanly as it may appear. We have evidence something is still ongoing.