Summary[]
Wraith is a Stealth Program which, once installed in a node, permanently disables the node's functionality and firewall regeneration for the rest of the hack. The Access program needs to be installed on a neighbouring node before Wraith can be installed.
Wraithed Security Nodes:
- Turrets and Black ICE nodes will no longer attack.
- Code Gate filters will be removed.
- Scanners will no longer detect subsequent programs.
- Guardians will no longer apply shields.
Wraithed A.I. nodes:
- A.I. Hawk will no longer attack.
- A.I. Beetle will no longer regenerate firewall of nodes.
- A.I. Squid will no longer detect subsequent programs.
All Wraithed Nodes:
- Disabled nodes are unable to spread a Sentry's antivirus.
- Disabled nodes are prevented from regenerating their firewall.
Statistics[]
- Notes: While the Wraith is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
More Info here: Max amount of B-coins at Core Level.
Program Level |
Visibility (per second) |
Compilation Price |
1 | 135 / second | B100 |
2 | 130 / second | B200 |
3 | 125 / second | B300 |
4 | 120 / second | B400 |
5 | 115 / second | B500 |
6 | 110 / second | B600 |
7 | 105 / second | B700 |
8 | 100 / second | B800 |
9 | 95 / second | B900 |
10 | 90 / second | B1,000 |
11 | 85 / second | B1,100 |
12 | 80 / second | B1,200 |
13 | 75 / second | B1,300 |
14 | 70 / second | B1,400 |
15 | 65 / second | B1,500 |
16 | 60 / second | B1,600 |
17 | 55 / second | B1,700 |
18 | 50 / second | B1,800 |
19 | 45 / second | B1,900 |
20 | 40 / second | B2,000 |
21 | 35 / second | B2,100 |
Program Level |
Upgrade Cost |
Experience Gained |
Research Time |
Required Evolver Level |
1 | B8,000 | 475 | 18 Hours | 5 |
2 | B16,000 | 500 | 24 Hours | 5 |
3 | B32,000 | 600 | 32 Hours | 6 |
4 | B48,000 | 700 | 40 Hours | 6 |
5 | B60,000 | 800 | 48 Hours | 7 |
6 | B80,000 | 830 | 56 Hours | 7 |
7 | B100,000 | 860 | 64 Hours | 8 |
8 | B120,000 | 900 | 72 Hours | 8 |
9 | B140,000 | 930 | 80 Hours | 9 |
10 | B160,000 | 960 | 88 Hours | 9 |
11 | B180,000 | 1,000 | 96 Hours | 9 |
12 | B200,000 | 1,080 | 104 Hours | 10 |
13 | B220,000 | 1,160 | 112 Hours | 10 |
14 | B260,000 | 1,250 | 120 Hours | 10 |
15 | B300,000 | 1,330 | 128 Hours | 11 |
16 | B340,000 | 1,410 | 136 Hours | 11 |
17 | B380,000 | 1,500 | 144 Hours | 11 |
18 | B420,000 | 1,625 | 156 Hours | 11 |
19 | B440,000 | 1,750 | 168 Hours | 12 |
20 | B460,000 | 1,875 | 180 Hours | 12 |
21 | B480,000 | 2,000 | 192 Hours | 12 |
Total | B4,444,000 | 23,535 | 2,058 Hours | 12 |
Tips[]
- Unlike Access, the Filter statistic of a Code Gate doesn't apply to Wraiths, so they always take 2 seconds to install.
- When dealing with Code Gates, it is generally advisable to install a Wraith to disable the Gate's Filter before installing an Access, as the Visibility cost will be less than if one installed an Access under the effect of the Filter. The exception is when the Gate and Wraith are low level, but the Access is high level.
- Since nodes under the Wraith effect do not spread antivirus, it can sometimes be beneficial to wraith a chokepoint deep in the network. This could save a lot of programs near the start of the hack, depending on the number, level, and positioning of sentries.
Hackers Wikia - Programs List | ||
---|---|---|
Programs | Nodes | Gameplay |
Offensive Programs |
Battering Ram
Beam Cannon
Blaster
Kraken | |
Defensive Programs | ||
Stealth Programs |
Access Data Leech Portal Wraith | |
A.I. Programs |