Gridinsoft Logo
File Icon

The Setup.exe (The Last of Us Part II Setup) File Analysis

Technical Analysis

File Name Setup.exe
File Type
PE32 executable (GUI) Intel 80386, for MS Windows
Scanner Version 1.0.212.174
Database Version 2025-04-09 20:01:07 UTC

Clean File

No threats detected by our scanner

0%
Detection Rate
4,517,945
File Size (bytes)
2025-04-09
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
9ff659e150b4111ee6ead6c260d0ceb0
SHA1
12cf3f2a770ebc1b6a4cc0bbaa0d29948ac233b8
SHA256
f10df8f7c30db89b2e6ba95a25ecb7d0a9bc194042cea50da91f1d26829e9df4
SHA512
c5651bea3df2f65234a42ddf2dfb2752fe7add52358f969849edb48f38a017c7e538c3059aa9855905a2bdba095873b3b09477c2ac9a9b2621cad8f32f55e649
ImpHash
884310b1928934402ea6fec1dbd3cf5e

PE Analysis

Basic Information

Icon
Hash: 66ea26ec654d543312d77f0ef2333f94
Fuzzy: 3471b7e04ec2650abe6e0009862eba2f
dHash: 24cece1c1c5cdcdc
Image Base 0x00400000
Entry Point 0x00409c14
Compilation Time 1992-06-19 22:22:17
Checksum 0x00000000 (Actual: 0x0045620a)
OS Version 1.0
PEiD Signatures PE32 executable (GUI) Intel 80386, for MS Windows
Digital Signature No valid SignedData structure was found.
Imports 5 libraries
kernel32, user32, oleaut32, advapi32, comctl32
Exports 0 functions
Resources 21 Resources
Sections 8 Sections

Version Information

Comments This installation was built with Inno Setup.
CompanyName Decepticon
FileDescription The Last of Us Part II Setup
FileVersion
LegalCopyright Decepticon
ProductName The Last of Us Part II
ProductVersion v.1.0.10407.0714
Translation 0x0000 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
CODE 0x00001000 37,688 bytes 37,888 bytes 6.56 (Compressed) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 0F1E58BEE0E7F7B353DE3DDE9DE0259D
DATA 0x0000b000 588 bytes 1,024 bytes 2.75 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE E7DD09E5875D98F57A11BE52CD2304A5
BSS 0x0000c000 3,664 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.idata 0x0000d000 2,384 bytes 2,560 bytes 4.43 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE BB5485BF968B970E5EA81292AF2ACDBA
.tls 0x0000e000 8 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.rdata 0x0000f000 24 bytes 512 bytes 0.20 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 9BA824905BF9C7922B6FC87A38B74366
.reloc 0x00010000 2,224 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ D41D8CD98F00B204E9800998ECF8427E
.rsrc 0x00011000 41,036 bytes 41,472 bytes 6.45 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 04F18F0BB33A0F405A32CB56E297A3A7
Entropy Analysis Alert

1 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 21 (39,842 bytes)
Resource Type Count Total Size Percentage
RT_ICON 11 34,344 bytes
86.2%
RT_STRING 6 2,710 bytes
6.8%
RT_RCDATA 1 44 bytes
0.1%
RT_GROUP_ICON 1 160 bytes
0.4%
RT_VERSION 1 1,208 bytes
3%
RT_MANIFEST 1 1,376 bytes
3.5%

Certificate Chain Analysis

Certificate Information
Product The Last of Us Part II
Description The Last of Us Part II Setup
Copyright Decepticon

✓ This file has been digitally signed and the certificate chain has been verified

  • The signature ensures file integrity and authenticity from the publisher
  • Timestamping proves when the signature was applied
Certificate Verification Status

No valid SignedData structure was found.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Remember: This is Result of Online Virus Scanner

Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics:

Download Anti-Malware

Keep Your System Protected

This file appears clean, but regular security maintenance is important

  1. Regular Scans: Run weekly system scans to detect new threats before they can cause damage.
  2. Keep Software Updated: Ensure your operating system and all applications have the latest security patches.
  3. Safe Browsing: Avoid suspicious websites and never download software from untrusted sources.
  4. Email Security: Be cautious with email attachments and links, even from known contacts.
Proactive Protection
This file passed all security checks, but stay vigilant. New malware variants appear daily that can evade detection. Always verify files come from official sources and check digital signatures when available.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware