‘Hereditary’ Ending Explained – What the Hell Happened?

Ari Aster’s Hereditary is deeply disturbing and also a bit complicated. It weaves its mythology in such a way that you’re never completely sure what is actually happening and how much is just the characters’ deteriorating mental state. But there is a supernatural element to the story and that element is key to understanding the film’s twisted ending. Before we try to make sense of the ending, let’s just recap briefly what happened. Peter (Alex Wolff), now possessed by Paimon, one of the eight kings of hell, is worshipped by the cult of Paimon which his grandmother — declared “Queen Leigh” by the cult’s followers — formally led with Joan (Ann Dowd) as her top lieutenant. The decapitated bodies of Peter’s parents have been organized into a worshipful position, and Peter, who is now addressed as Charlie (Milly Shapiro), because he also has his sister’s spirit, is told that the trinity (presumably the Holy Trinity of the Father, the Son, and the Holy Ghost) has been destroyed and that Paimon now reigns. Hail Paimon!

Commercials Cooperation Advertisements:


(1) IT Teacher IT Freelance

IT電腦補習

立刻註冊及報名電腦補習課程吧!
电子计算机 -教育 -IT 電腦班” ( IT電腦補習 ) 提供一個方便的电子计算机 教育平台, 為大家配對信息技术, 電腦 老師, IT freelance 和 programming expert. 讓大家方便地就能找到合適的電腦補習, 電腦班, 家教, 私人老師.
We are a education and information platform which you can find a IT private tutorial teacher or freelance.
Also we provide different information about information technology, Computer, programming, mobile, Android, apple, game, movie, anime, animation…


(2) ITSec

https://itsec.vip/

www.ITSec.vip

www.Sraa.com.hk

www.ITSec.hk

www.Penetrationtest.hk

www.ITSeceu.uk

Secure Your Computers from Cyber Threats and mitigate risks with professional services to defend Hackers.

ITSec provide IT Security and Compliance Services, including IT Compliance Services, Risk Assessment, IT Audit, Security Assessment and Audit, ISO 27001 Consulting and Certification, GDPR Compliance Services, Privacy Impact Assessment (PIA), Penetration test, Ethical Hacking, Vulnerabilities scan, IT Consulting, Data Privacy Consulting, Data Protection Services, Information Security Consulting, Cyber Security Consulting, Network Security Audit, Security Awareness Training.

Contact us right away.

Email (Prefer using email to contact us):
SalesExecutive@ITSec.vip

Leave a Reply

Your email address will not be published. Required fields are marked *