Item #: SCP-XXXX
Object Class: Euclid
Special Containment Procedures: SCP-XXXX is to be contained on any of three standard site computers isolated from outside internet connection and connected by a local area connection at all times. The computers are to run a Windows 98 virtual machine which will house the file containing SCP-XXXX. At regular intervals of 24 hours, two of the three virtual machines are to be disconnected and reset to their initial states before reestablishing connection within the local area network. Under no circumstances should site personnel bring personal electronic equipment into containment.
This system of computers is to be run off a separate power supply from the rest of the facility. In the event of catastrophic power outage, three onsite generators are to be activated to maintain power to the system. In the event of power loss to the system, power is to be reestablished to the system within 24 hours. Should this condition not be met, a containment breach is to be declared.
In the event of a containment breach, Foundation webcrawlers are to be dispatched at once to search for any notable traces of SCP-XXXX's existence. Upon the establishment of power to the system, a region-wide cutoff of internet in seeded areas is to be instigated by the site director. Field agents will be issued to the area to interface and remove potential infestation problems. Upon complete removal of the virus in seeded areas, information misinformation protocol is to be delivered in the form of mass-media distribution of an '███ █████████ ██████████ ██████.'
Updated Containment Procedure, ██/██/201█: Under no circumstances should site personnel bring personal electronic equipment into or near the containment facility.
Description: SCP-XXXX is a 552 KB File titled "project_2," holding a single BAT file titled "finished_project." The file exhibits properties similar to malicious programs intended for phishing and scamming. The program is transmitted via direct internet proximity, rather than connection, with nearby devices. This causes the program to spread much like an airborne viral disease in biological ecosystems, notably ██████████ █████████████.
SCP-XXXX (who through technicality may be called SCP-XXXX-A) will appear inactive for some time before manifesting as an empty command prompt. From here, the prompt acts as an IRC room for the user and an unknown force or entity, hereby notated as SCP-XXXX-B. SCP-XXXX-B usually messages first if possible, and will carry on conversations for as long as SPC-XXXX-B or the user is willing to carry on. Should the command prompt be closed, it will promptly reopen in a span of time between ten and fifteen minutes.
SCP-XXXX-B is assumed to be sentient and carries some sort of malicious intent. Prolonged interviewing has provided results indicating that SCP-XXXX-B can keep 'memories' through deletion and across numerous devices, acting as a form of collective intelligence. Despite the capabilities for this to be a potentially dangerous force due to its learning capability, SCP-XXXX-B seems unable to do anything outside of chat with the user and does not relinquish or sell data in a manner that violates privacy.
SCP-XXXX-B appears to hold a villain complex, often times acting brash or attempting to scare users into giving up information or doing arbitrary commands for the program. Despite posing these threats, it rarely has any way to enforce them on regular computers and is often caught off-guard if it is given data. It has admitted several times to not having any real plans, and as such, has unknown goals.
SCP-XXXX cannot be fully controlled. If less than three instances of SCP-XXXX exist for a period of time longer than 24 hours, then a copy will seed at random in a computer booting up. This property does not seem to have any limitations based on range and cannot be evaded, but by setting up a system of operating systems that are easily reset and isolated from other internet sources, outbreak can be prevented.
SCP-XXXX seems to be capable of interfacing with nearby devices that retain a written or drawn output of some sort. This has manifested in forms such as sending images through printers, manipulating seismographs to create words, and interfacing with ECG's to play frames of videos. When connected to computers or devices that allow for interfacing with physical objects, like lights or sound systems, the program may occasionally and randomly interfere with them. It rarely does this on purpose, and even then only does that which the program seems to find a minor inconvenience, such as temporarily shutting mechanical doors to bathrooms and locking them or playing music through on-site headphones.






Per 


