1. ░ ▓ ■▄
  2. ■▀█▄▄ -Battery - ▄▄ ■ ░
  3. ▐███▄ ▓ ███▀ ▄██▓ ■ ▓
  4. ███▓▌ ▄▀ ■ ░ ▓██▀ ▀▀▀▀ ▄▄▄▄ ▄▄ ▄ ■▀ ░
  5. ▐███▓ ▀▀█▀▄▄▄▄▄▀▄▄▄▄▄▄▄▄▀▀▀▀▀▀ ░▀ , ■▄
  6. ███▓ ▄▄▄ ▐██▓ ▄████▄ ▓ ▐▌
  7. ▐██▌▄█▄ ▄█▄▀██▓▄ ██▓▌ ████ ▄██▀▄█▄ ▓██▌▀██▌ █▄ ▓
  8. ███▌ ██▓ ███ ▐██▓▌ ▐██▓ ███▌ ███▌ ██▓ ▐▓██ █▓▌ █▌ ▐▌
  9. ▐███ ▐██▓▐██▌ ██▓▓ ▐██▓ ██▓▌▐███ ▐█▓▌▓██▌ ▀█▀ █▄ █
  10. ▐ ▐██▌ ▐█▓▌▐██▌ ▐██▓▌ ▐███ ███▓▐███▌ ▄██▀ ▓██ ▀▄ ▐ █▓▐▌
  11. ███▌ ███▌▐███ ████ ▌ ██▓▌ ███▓▐████ ▄ █▓█▌ █▄ ▄ ▐▓█
  12. ▓ ▐███ ▄██▀ ▀██▌▄█████▌ ███ ▐███ ▀███▄ ▄██▀▐███ ▐██▓▌ █▀
  13. █ ▌ ▀██▀ ▀▀▀▀ ▄█▀ ▀▓█▄ ▀▀▀▀ ▀███▄ ▀▀▀ ▄
  14. ▀ ▀▀▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ■ ▄▄▄▄▄▄▄▄ ▀ ▄▄▄▄▄▄▄▄▄▄ ▀ ▄ █ ▀ ▄▄▄▄ ▄
  15. ■ ▓ ▄▓▀▀ ▀▀▀▐ █ ▄
  16. ▀▓▄ ▓█▀█ ▓█▀█ ▓█▀█ ▓█▄▄ ▀▐▀█ ▓█▀▄ ▓█▄ ▓█▄▄ ▄ ▀▄▄ bumax[BAFH] ▒
  17. ▄ ▀▀█▄ ██▀▀ ██ ██▄▄ ▄▄▄█ ██▄▄ ██ █ ██ ▄▄▄█ ▄ ▀▀▀▓▄▄
  18. ▄▄▄▀ ▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▀▄▄▄▄▄▄▄▄▄▄▄ ■ ▀ ▌
  19. ▀▄▄▄▄▄▄▓▀▀▀▀ ▀▀▀▀███▄▄▄ ▓ ▄▄▀ ▀
  20. ▀▀▀▀▀██▄▄▄▄▄ ▄▄▄▄▀▀▀▀ ■
  21. ■ ▓▀▀▀
  22. ▀▄ ▌
  23. Clandestine Update v1.03 (c) Logic Artists
  24. ▀▀ ▄▄▄▄ ▄
  25. ■ ▄ ▀▀▀▀▀▀▀███▄▄▄▒▄▄▄▄▄▄▄ ▄▄░▀
  26. ▐ ▓ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▓▄▄▄▄▄▄▄▄▄▄▄▄▄████▀▀▀
  27. ▐▌ Release Date: 11/24/2015 Protection: Steam ▌
  28. █ ▓
  29. ▓▌ Cracked By..: BAT-TEAM # of Files: few ▐
  30. ▐▌ ▐
  31. ▄▄▄ ▌ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▐ ▄▄▄▄▄▄
  32. ■ ▓█▀█ ▓█▀█ ▓█ ▓█▀█ ▓█▀█ ▓█▄▄ ▓█▀█ ▓█ ▓█▀▄ ▓█▀▀ ▓█▀█ ▐
  33. ██ ██▄▄ ██▄ ██▄▄ ██▀█ ▄▄▄█ ██▄▄ ██ ██ █ ██▀ ██▄█
  34. Note:
  35. ~~~~~
  36. changelog.txt included.
  37. Clandestine.Update.v1.02-BAT needs to be installed for this
  38. release.
  39. Game:
  40. ~~~~~
  41. Summary
  42. Clandestine is a 2-player or singleplayer
  43. stealth/hacking game set in 1996. Asymmetrical co-op
  44. allows one player to take the role of the spy while a
  45. friend provides overwatch and assistance as the hacker,
  46. and unravel a post-Cold War espionage conspiracy.
  47. The year is 1996, five years after the dissolution of
  48. the Soviet Union. A string of accidents and murders gone
  49. mostly unnoticed by the public eye have put the world of
  50. international espionage on high alert - veteran Cold War
  51. operatives from both sides of the former Iron Curtain
  52. are being assassinated around the globe. High-ranking
  53. officials of the CIA and the FSB secretly establish a
  54. joint task force to investigate the leaks. Codenamed The
  55. Kingbridge Executive, the group is funded with whatever
  56. money could be skimmed off of official projects and
  57. staffed by whoever could be spared from official
  58. operations. As field operative Katya Kozlova or hacker
  59. Martin Symborski, you will be deployed on dangerous
  60. missions across Europe and North America, chasing the
  61. source of the leaks.
  62. Key Features
  63. * Single Player & Asymmetrical co-op: Play as the spy
  64. while a friend guides you through the missions or take
  65. on the role of the hacker to crack infrastructure and
  66. defeat security systems.
  67. * A return to hard-core stealth games where the
  68. enemies are lethal and combat is unforgiving.
  69. * A deep hacking system built around core stealth game
  70. mechanics, rife with options to manipulate the game
  71. world and mess with your enemies.
  72. * Use social engineering in cooperative dialogue
  73. sequences to bypass security checkpoints and gain
  74. entry to restricted areas.
  75. * Your actions won't go unnoticed - the story will
  76. respond to how much evidence you leave in each mission
  77. and how many dead bodies you leave in your wake.
  78. Playing as the Spy
  79. The role of the Spy will be familiar to fans of
  80. stealth/action games. As the Spy, you will experience
  81. Clandestine as a 3rd person game, controlling the
  82. movements and actions of Katya in the game world. Katya
  83. is the boots on the ground, armed with weapons and
  84. gadgets that you can use to stay alive and evade your
  85. opponents. Katya is also well trained in hand-to-hand
  86. combat, and can use lethal or non-lethal stealth
  87. takedowns to take down enemies, leaving behind as little
  88. evidence as possible. During the mission, it also falls
  89. to the Spy to search for dossiers and intel to unlock
  90. new equipment and software for subsequent missions.
  91. Playing as the Hacker
  92. Martin operates in an entirely different way than the
  93. spy, which is reflected in the hacker player's interface
  94. and game mechanics. As the Hacker, players have access
  95. to four game windows and a toolbar. These game windows
  96. are: the Camera Feed, the Console, the Network View, and
  97. the Tactical Map.
  98. Camera Feed
  99. The Camera Feed allows the hacker to observe the game
  100. world and scout ahead for the Spy. By default, the
  101. Camera Feed displays the Operative Camera (a hidden
  102. camera worn by Katya), but you can also jump into
  103. surveillance cameras on the Tactical Map (see below) to
  104. look through them and scout the levels for enemies and
  105. other threats. The Camera Feed also displays the status
  106. of the Spy's health.
  107. Console
  108. The Console always displays game Objectives at the top
  109. of the window and prints important information in the
  110. Message Log such as cracked keypad codes. You can also
  111. use it to communicate with the Spy via the in-game text
  112. chat.
  113. Network View
  114. The Network View window is where Hackers can access the
  115. computer network(s) which run all of the electronic
  116. infrastructure in the mission area. This includes door
  117. keypads, PCs, Servers, Firewalls, and Hazards (steam
  118. pipes and electrical boxes which can be triggered to
  119. cause "accidents"). Hackers must be mindful of the
  120. Network Admin, an enemy AI which searches for changes in
  121. the Network and tries to correct them. Not only will the
  122. Admin kick a hacker from the Network if caught, the
  123. Admin will also reset firewalls and pass-codes. Hackers
  124. can unlock Viruses and DDOS attacks to keep the Admin
  125. busy when trying to escape or complete an objective.
  126. Tactical Map
  127. The Tactical Map is the window Hackers use to provide
  128. direct support to their Spy partners. This includes
  129. gaining access to cameras for scouting and observation,
  130. tagging enemies so the spy can track their location
  131. without maintaining line-of-sight, and use Local Assets
  132. to drop ammo or health, "clean up" bodies, cancel alarms
  133. before they sound, and even bribe enemies.
  134. ▐▀ ▓
  135. ▄▄▄ ▌ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▐ ▄▄▄▄▄▄
  136. ■ ▓█ ▓█▀▄ ▓█▄▄ ▓█▄ ▓█▀█ ▓█ ▓█ ▓█ ▓█▀▄ ▓█▀▀ ▓█▀█ ▐
  137. ██ ██ █ ▄▄▄█ ██ ██▀█ ██▄ ██▄ ██ ██ █ ██▀ ██▄█
  138. 1. Unpack release.
  139. 2. Install the Update to where you installed the game.
  140. 3. Copy the cracked content from /Crack dir
  141. 4. Enjoy! ;)
  142. ▐▀ ▓
  143. ▄▄▄ ▌ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▐ ▄▄▄▄▄▄
  144. ■ ▓█▀ ▓█▀█ ▓█▀▄ ▓█▄ ▓█▀█ ▓█▀ ▓█▄ ▓█ ▓█▀▄ ▓█▀▀ ▓█▀█ ▐
  145. ██▄▄ ██▄█ ██ █ ██ ██▀█ ██▄▄ ██ ██ ██ █ ██▀ ██▄█
  146. WE DONT WANT ANYONE TO CONTACT US!
  147. WE CONTACT YOU IF NEEDED!
  148. WEB: NEVER - IRC: NEVER - EMAIL: NEVER
  149. ■ ▓ ▄ ■ ▄
  150. ▄ ▐▀ ▀▄ ▓
  151. ▄▄▄ ■ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▐ ▄▄▄▄▄▄
  152. ▐ ▐
  153. ▐ ▓█▀ ▓█▀█ ▓█▀█ ▓█▀█ ▓█▄ ▓█ ▓█▀▄ ▓█▀ ▓█▄▄ ▐
  154. ▄ ██▄█ ██ ██▄▄ ██▄▄ ██ ██ ██ █ ██▄█ ▄▄▄█ ▄
  155. ▄▄▄▀ ▐ ▐ ▐ ▓
  156. ▀▄ ░ ▐
  157. ■ Greetings to all of our friends around scene! █▌
  158. ▐ █▓
  159. ▄ ▄▀█▄▄▄█▐
  160. ▄▀▀██▄▄▄▄▄▄▄ ▄▄█▀▀▀▀██▄▄▄▄ ■ ▀▀▀
  161. ■ ■ ▀▀▀▀▀░█▄▄▄▄ ▄▄▄▄▄■▀ ▓▀▀▀█ ▀
  162. ▐ ▄ ▓ ▀▀▀▀▀
  163. ▀ NFO UPDATED 10/07/2015