Windows Executor | Nihon

Hana plugged in the USB. On it was a single executable she’d compiled that morning—a honeytoken disguised as a domain admin hash. If Yamada tried to access the exfiltrated AD data, the token would phone home with his real IP.

“Phase two?” Kenji asked.

He zoomed in. The payload was routing through a series of onion relays, but the final egress node was an IP registered to… the Metropolitan Police Department’s own cyber forensics lab. Nihon Windows Executor