Hackers Wikia
Advertisement


  Български - Червек  简体中文 - 蠕虫病毒  正體中文 - 蠕蟲  Čeština - Červi  English - Worms  Français - Asticots  Deutsch - Würmer  Bahasa Indonesia - Cacing(Bahasa Indonesia)  Italiano - Vermi  日本語 - ワーム  Bahasa Malayu - Cacing  Polski - Robaki  Português - Vermes  Română - Viermi  Русский - Черви  Español - Gusanos  Türk - Solucanlar  Tiếng Việt - Sâu Vô Tính


This page is currently in English. Please translate into Portuguese.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



Resumo[]


Worms primary trait is that they multiply. Install one and you'll soon have many.

The Worm is a Brute Force Offensive Program which has the special ability to replicate and install itself. The Worm will attack connected nodes one at a time.

It has the following action priorities:

  1. It attacks an adjacent node with the highest Attack Priority.
  2. If all adjacent nodes are captured, it will replicate itself in its residing node, unless the node is full.
  3. If the residing node is full, it installs duplicates of itself in adjacent empty program slots. (Citation needed for order of installation.)

Each duplication takes 0.5 to 3 seconds, depending on level, and the timer is reset when an adjacent node is recaptured by the network.

Worms have a dynamic attack priority, and will change its attack target immediately if an adjacent node with higher Attack Priority is reclaimed by the network.

Estatísticas[]

  • Notes: While the Worms program is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Program Stats
Nível Strength
(DPS)
Damage
(per hit)
Duplication
Time
Custo de
Compilação
1 12 6 3.0 Segundos B5
2 14 7 2.9 Segundos B10
3 16 8 2.8 Segundos B20
4 18 9 2.7 Segundos B30
5 20 10 2.5 Segundos B40
6 23 11.5 2.4 Segundos B50
7 26 13 2.3 Segundos B60
8 30 15 2.2 Segundos B70
9 34 17 2.0 Segundos B80
10 39 19.5 1.9 Segundos B90
11 44 22 1.8 Segundos B100
12 51 25.5 1.7 Segundos B110
13 58 29 1.5 Segundos B120
14 66 33 1.4 Segundos B130
15 75 37.5 1.3 Segundos B140
16 86 43 1.2 Segundos B150
17 98 49 1.0 Segundos B170
18 111 55.5 0.9 Segundos B190
19 127 63.5 0.8 Segundos B210
20 145 72.5 0.7 Segundos B230
21 165 82.5 0.5 Segundos B250
Research Stats
Nível Custo de
Atualização
Experience
Gained
Tempo de
Pesquisa
Nível de Desenvolvedor
Necessário
1 B256 250 2 Horas 2
2 B2,048 400 8 Horas 3
3 B4,096 425 10 Horas 3
4 B8,000 450 12 Horas 4
5 B16,000 475 18 Horas 4
6 B32,000 500 24 Horas 5
7 B48,000 575 30 Horas 5
8 B60,000 650 36 Horas 6
9 B80,000 725 42 Horas 6
10 B100,000 800 48 Horas 7
11 B120,000 825 54 Horas 7
12 B140,000 850 60 Horas 8
13 B160,000 875 66 Horas 8
14 B180,000 900 72 Horas 9
15 B200,000 930 80 Horas 9
16 B220,000 960 88 Horas 10
17 B260,000 1,000 96 Horas 10
18 B300,000 1,125 108 Horas 11
19 B340,000 1,250 120 Horas 11
20 B380.000 1,500 144 Horas 12
21 B420,000 1,750 168 Horas 12
Totals B3,070,400 17,215 1,286 Horas 12


Patch Notes[]

As of Patch v1.025, Worm's Duplication Time scales with their level. This was previously 3 seconds at every level.

Tips[]

  • Worms can save programs and time by capturing weaker nodes and ones of less importance.
  • Placing Worms at the back of the network behind your main attack will give them time to replicate while initial nodes are taken care of.
  • Worms work well with the Kraken.
  • You can remove a program from a node to give Worms space to move forward.
  • Be careful around a Code Gate. Since Worms will always choose to attack when able, a Code Gate directly on a branching path will cause your Worms to stay there until the gate is removed.
Hackers Wikia - Programa
Início
Programa Nodos Jogabilidade
Ofensivo

 Aríete   Canhão Laser   Explosão   Kraken 
 Maníaco   Raio   Shuriken   Vermes 

Defensivo

 Muralha-ICE   Protetor 

Furtivo

 Acesso   Sanguessuga de dados   Portal   Espetro 

Advertisement