There is no known unpacker for Setup Factory, so I just ran the setup and attached cheat engine.
From there, you do a string search for the error message you're getting and browse the memory regions.
Then I figured out the game uses a lua script for the installation and I found this code:
View attachment 671437
Assuming they just copy paste this script for every release, you can just do a search for 'scriptcrc' and you'll find what you're looking for.
3809473158 is the CRC the patcher is checking for, in hexadecimal this will give you the value 0xE30FF286.
I then created a new Script.vdf file with my hex editor containing 4 0x00 bytes and ran the following program over it:
You must be registered to see the links
(I used the python version).
Syntax used was 'python forcecrc32.py Script.vdf 0 E30FF286'
This will spit out a file that you can use to bypass the check.
Happy hacking!