Unravel Secrets in The Coma 2: Vicious Sisters

The Coma 2: Vicious Sisters is a captivating survival horror-adventure game set in a hauntingly atmospheric environment. Players assume the role of Mina Park, who must navigate through her abandoned school and the eerie Sehwa district while evading a psychotic killer. The game emphasizes exploration, allowing players to uncover the mysteries of the shadow realm, interact with a diverse cast of characters, and solve intricate puzzles that reveal essential clues to aid in survival.

This title combines a gripping narrative with strategic gameplay, where players must craft items to prepare for unforeseen dangers. The Dark Song, a formidable antagonist, adds an intense layer of challenge, as players must balance exploration with the constant threat of being hunted. With the need for quick thinking and tactical decisions, The Coma 2: Vicious Sisters promises an engaging experience for fans of the horror genre.

 0/1

App specs

Also available in other platforms

Program available in other languages



User reviews about The Coma 2: Vicious Sisters

Have you tried The Coma 2: Vicious Sisters? Be the first to leave your opinion!

Add review

You may also like

Explore Apps

Latest articles

Laws concerning the use of this software vary from country to country. We do not encourage or condone the use of this program if it is in violation of these laws.
Softonic

Is The Coma 2: Vicious Sisters safe?

100/100

Score result: Clean

This file passed a comprehensive security scan using VirusTotal technology. It is safe to download.

  • Virus free
  • Spyware free
  • Malware free
  • Verified by Security Partners

    VirusTotal logo

Scan Info

Last scan
Tuesday, May 20, 2025
Scan provider
VirusTotal

Softonic security commitment

The Coma 2: Vicious Sisters has been thoroughly scanned by our advanced security systems and verified by industry-leading partners. This file comes from the official developer and has passed all our security checks, showing no signs of viruses, malware, or spyware. For more information, visit our Security and Trust Center