Visit Thugon Official Website

THUGON FILE INSPECTOR AND MODIFIER v3.10

(AKA - THUGON FILE INVESTIGATOR APP) YES, IT IS FREE.

Watch Video Tutorial Watch Video File Investigation
Download (ZIP)
SHA-256 HASH:
FB32B819032931A0A98D5DBB339B6993BD047039C0F5052203459CF56387D390
TO USE THIS APP PLEASE READ HOW WINDOWS TREAT UNSIGNED/DOWNLOADED EXE:
https://www.thugon.com/encryption_apps.html

Purpose

I built this tool based on my knowledge of how files, antivirus, viruses and the web work. Therefore, mistakes can be made. The original version was more detailed and very aggressive; this version is tamed. THUGON FILE INSPECTOR AND MODIFIER is a powerful Windows utility designed to inspect and manage file metadata, security zones, alternate data streams (ADS), URLs, PE information, and more. It provides users with strong control over downloaded and local files for security auditing, analysis, and modification purposes. Some of the attached information is technical, but I have tried to be as thorough as possible to help everyone understand how this application works. The app does not have a help menu, so this write-up is provided to guide users and explain what the application does behind the scenes. WARNING: This is a very powerful tool. Please use it responsibly. The original purpose of this tool is strictly for DEFENSIVE use only. Please read the attached disclaimer carefully. This tool has no sponsors; therefore, mistakes or limitations may be present.

Description

This application can:

It is designed for IT professionals, security analysts, investigators and power users who need to verify, manage, investigate and secure files in a Windows environment. Important: Alternate Data Streams (ADS) are supported only on the NTFS file system. Saving a file to a USB drive formatted with FAT32 will permanently remove any existing ADS. To preserve ADS during file transfer or investigation, ensure that your USB drive or storage device is formatted with NTFS rather than FAT32, as many removable drives are still configured with FAT32 by default. ReFS does NOT support ADS in the same way NTFS does.

Security Zone Explanation (Zone.Identifier)

Windows uses security zones (Mark of the Web / MOTW) to track where a file originated from. This information is stored in the Zone.Identifier Alternate Data Stream (ADS). Understanding these zones helps determine the trust level of a file.

Zone IDZone NameDescription
0Local MachineFile originates from the local computer. Fully trusted.
1Local IntranetFile comes from a local network (LAN). Generally trusted within an organization.
2Trusted SitesFile downloaded from explicitly trusted domains configured by the user or administrator.
3InternetFile downloaded from the internet. This is the most common and considered untrusted by default.
4Restricted SitesFile comes from blocked or highly untrusted sources. Highest risk category.

Security Insight:

THUGON uses this information as part of its risk scoring system to help determine whether a file should be trusted or further analyzed.

Entropy Calculation & Analysis

Entropy is a measurement of randomness within a file. This tool uses it to help determine whether a file contains normal structured data or potentially suspicious content such as compressed, packed, or encrypted data.

How It Works

H = - Σ (p(x) * log2(p(x)))

Entropy Range

Interpretation

RangeMeaning
0.0 – 3.5Plain text / repetitive data
3.5 – 6.5Normal files
6.5 – 7.5Compressed or complex data
7.5 – 8.0Highly random (often encrypted/packed)

Security Insight

Important: High entropy does not automatically mean malicious.

How THUGON Uses It

Advanced Entropy Analysis (Technical)

Full binary analysis across 256 byte values with Shannon entropy calculation.

p(x) = count(x) / total_bytes
H = - Σ (p(x) * log2(p(x)))

Used as a heuristic indicator, not a standalone detection.

Risk Scoring System

IndicatorConditionPoints
MOTWZoneId = 3+20
Entropy> 7.5+25
ADSCustom streams+20 each
ScoreVerdict
0–29SAFE
30–69SUSPICIOUS
70–100HIGH RISK
Example:
MOTW → +20
Entropy → +25
ADS → +20
Total = 65 → SUSPICIOUS

Why it is Valuable

This tool is valuable because it allows you to quickly assess file safety, uncover hidden content, and manage security metadata. It ensures files are properly verified and provides the ability to modify or clean potentially risky metadata safely. Whether for auditing downloaded files or managing sensitive data, it gives users confidence and control over their files.

Disclaimer: This is a powerful tool. Please use it responsibly. This application is designed for defensive, security analysis, and educational purposes only—not for offensive use. The authors assume no responsibility or liability for any misuse of this tool. You are solely responsible for your actions and how you use this software. Use of this tool for illegal or malicious purposes may violate applicable laws in your jurisdiction. This software is provided "AS IS" and "AS AVAILABLE", without any warranties of any kind, either express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, and non-infringement. This tool has no sponsors; therefore, mistakes or limitations may be present. Use at your own risk.