Hackers Wikia
Advertisement
Hackers Wikia


  Български - Червек  简体中文 - 蠕虫病毒  正體中文 - 蠕蟲  Čeština - Červi  English - Worms  Français - Asticots  Deutsch - Würmer  Bahasa Indonesia - Cacing(Bahasa Indonesia)  Italiano - Vermi  日本語 - ワーム  Bahasa Malayu - Cacing  Polski - Robaki  Português - Vermes  Română - Viermi  Русский - Черви  Español - Gusanos  Türk - Solucanlar  Tiếng Việt - Sâu Vô Tính



Summary[]


Worms primary trait is that they multiply. Install one and you'll soon have many.

The Worm is a Brute Force Offensive Program which has the special ability to replicate and install itself. Worms will attack connected nodes one at a time, but unlike Beam Cannons, they have a dynamic attack priority and will change their target immediately if an adjacent node with higher Attack Priority is reclaimed by the network.

A Worm has the following action priorities:

  1. It attacks an adjacent node with the highest Attack Priority.
  2. If all adjacent nodes are captured, it will install duplicates of itself in empty program slots of the residing node, until the node is full.
  3. If the residing node is full, it will install duplicates of itself in the empty program slots of adjacent nodes.

Duplication onto adjacent nodes appears to prioritize the number of empty program slots on adjacent nodes, followed by their attack priority (citation needed). For example: If one Worm has an empty Core and an empty Compiler as adjacent nodes, first it will install two copies of itself on the Core so both nodes have the same number of empty program slots. Next it will install a copy on the Core because it has a higher attack priority, and then it will install a copy on the Compiler because the Compiler has more empty program slots. It will continue to switch back and forth in this manner until both nodes are full. Note this example assumes the worms installed on the Core and Compiler are busy attacking a hostile node instead of duplicating.

The delay between each duplication takes 3 to 0.5 seconds, depending on level, and the timer is reset when an adjacent node is recaptured by the network.

Statistics[]

  • Notes: While the Worms program is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Program Stats
Program
Level
Strength
(DPS)
Damage
(per hit)
Duplication
Time
Compilation
Price
1 12 6 3.0 seconds B5
2 14 7 2.9 seconds B10
3 16 8 2.8 seconds B20
4 18 9 2.7 seconds B30
5 20 10 2.5 seconds B40
6 23 11.5 2.4 seconds B50
7 26 13 2.3 seconds B60
8 30 15 2.2 seconds B70
9 34 17 2.0 seconds B80
10 39 19.5 1.9 seconds B90
11 44 22 1.8 seconds B100
12 51 25.5 1.7 seconds B110
13 58 29 1.5 seconds B120
14 66 33 1.4 seconds B130
15 75 37.5 1.3 seconds B140
16 86 43 1.2 seconds B150
17 98 49 1.0 seconds B170
18 111 55.5 0.9 seconds B190
19 127 63.5 0.8 seconds B210
20 145 72.5 0.7 seconds B230
21 165 82.5 0.5 seconds B250
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1 B256 250 2 Hours 2
2 B2,048 400 8 Hours 3
3 B4,096 425 10 Hours 3
4 B8,000 450 12 Hours 4
5 B16,000 475 18 Hours 4
6 B32,000 500 24 Hours 5
7 B48,000 575 30 Hours 5
8 B60,000 650 36 Hours 6
9 B80,000 725 42 Hours 6
10 B100,000 800 48 Hours 7
11 B120,000 825 54 Hours 7
12 B140,000 850 60 Hours 8
13 B160,000 875 66 Hours 8
14 B180,000 900 72 Hours 9
15 B200,000 930 80 Hours 9
16 B220,000 960 88 Hours 10
17 B260,000 1,000 96 Hours 10
18 B300,000 1,125 108 Hours 11
19 B340,000 1,250 120 Hours 11
20 B380.000 1,500 144 Hours 12
21 B420,000 1,750 168 Hours 12
Totals B3,070,400 17,215 1,286 Hours 12


Patch Notes[]

As of Patch v1.025, Worm's Duplication Time scales with their level. This was previously 3 seconds at every level.

Tips[]

  • Typically, you only need one or two Worms per hack since they will multiply.
  • Using Worms to capture weaker and less important nodes can be useful to save programs.
  • Placing Worms at the back of the network will give them time to replicate while you focus on your main attack.
  • Remember to remove programs from nodes you have captured to give Worms space to move forward.
  • Worms work well with the Kraken.
  • Be careful around a Code Gate. Since Worms will always choose to attack when able, a Code Gate directly on a branching path will cause your Worms to stay there until the gate is removed.
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram.png Battering Ram  Ion cannon.png Beam Cannon  Blaster.png Blaster  Kraken.png Kraken 
Maniac.png Maniac  Shock.png Shocker  Shuriken.png Shuriken  Worms.png Worms 

Defensive Programs

Icewall.png ICE Wall  Protector.png Protector 

Stealth Programs

Access.png Access  Dataleach.png Data Leech  Portal.png Portal  Wraith.png Wraith 

A.I. Programs

Beetle.png A.I. Beetle  Hawk.png A.I. Hawk  Squid.png A.I. Squid