A sequel to the Chernobylite action game

Chernobylite 2: Exclusion Zone is a premium single-player RPG that allows you to explore an open world in a 3D post-apocalyptic horror realm. Developed by Farm 51, the game follows the story of Igor, a former employee of the Chornobyl Power Plant, searching for her fiancée, Tatyana, after the tragic disaster.  

Top Recommended Alternative

Chernobylite 2: Exclusion Zone functions similarly to games like Elden Ring and God of War in the open-world exploration aspect. This game is a continuation of the Chernobylite series. You’ll need to fight against hostile enemies, and mutated living forms, while also acquiring strange new abilities due to the radiation.

Lead the survivors of a disaster 

In Chernobylite 2: Exclusion Zone, it’s like being cut off from the world—left with nothing and trapped in the Chornobyl Exclusion Zone. In this game, players take on the role of a planewalker, who travels through alternate realities in search of high-energy material called “Chernobylite”.  Your mission is to fight for your survival while finding the material and leading the remaining human survivors to safety

To stay alive in this sequel, you can use the advanced melee combat system, arsenal of firearms, and stealth approach. There’s also an online co-op mode, so you can navigate the wasteland with a friend and ask for help to fight enemies. With this, you can assemble your team, too, and discover their unique strengths and abilities. The controls are familiar enough like other games in the genre as well.

However, you must choose wisely whether to trust your comrades or not. You can develop your character, with attributes and skills that can affect your combat. Players are free to develop more than one character skill set. You can also create or dominate factions, unlock upgrades, and expect multiple endings to the game’s story mode. However, it only works on a 64-bit processor and operating system and not on 32-bit systems. 

Expanded version of the first installment 

Chernobylite 2: Exclusion Zone is a must-try game for players who like post-apocalyptic games. With its 3D graphics, it provides an expanded version of everything players like in its first game—including the story, characters, combat, and exploration—along with its open world. It also includes an online co-op that allows players to have company as they fight off enemies. Despite some minor nitpicks, this is a great game to play with friends.

  • Pros

    • An open-world game
    • 3D post-apocalyptic graphics
    • Challenging combat
    • Online co-op
  • Cons

    • Only works on a 64-bit processor
 0/5

App specs

  • License

    Full

  • Version

    varies-with-devices

  • Latest update

  • Platform

    Xbox Series X|S

    Other platforms (3)
  • Language

    English

    Available languages

    • English
    • Spanish
    • German
    • French
    • Italian
    • Russian
    • Polish
    • Chinese
    • Korean
    • Japanese
  • Downloads

    1

  • Developer

Also available in other platforms

Program available in other languages



User reviews about Chernobylite 2: Exclusion Zone

Have you tried Chernobylite 2: Exclusion Zone? Be the first to leave your opinion!

Add review

You may also like

Explore Apps

Latest articles

Laws concerning the use of this software vary from country to country. We do not encourage or condone the use of this program if it is in violation of these laws.
Softonic

Is Chernobylite 2: Exclusion Zone safe?

100/100

Score result: Clean

This file passed a comprehensive security scan using VirusTotal technology. It is safe to download.

  • Virus free
  • Spyware free
  • Malware free
  • Verified by Security Partners

    VirusTotal logo

Scan Info

Last scan
Thursday, August 29, 2024
Scan provider
VirusTotal

Softonic security commitment

Chernobylite 2: Exclusion Zone has been thoroughly scanned by our advanced security systems and verified by industry-leading partners. This file comes from the official developer and has passed all our security checks, showing no signs of viruses, malware, or spyware. For more information, visit our Security and Trust Center