This module implements a Discord token stealer and account-abuse toolkit. It enumerates LOCALAPPDATA and APPDATA to locate Discord and Chromium-based browser profiles, reads the “Local State” file to extract an encrypted master key, parses LevelDB files for strings prefixed with “dQw4w9WgXcQ:”, base64-decodes and AES-GCM-decrypts them via win32crypt.CryptUnprotectData to recover user tokens. Recovered tokens are validated by calling https://discordapp[.]com/api/v6/users/@me, then cached locally. The code exposes numerous functions that accept a user_token and perform actions on behalf of the victim—sending messages, adding reactions, generating invites, listing channels/guilds, fetching DM channels, etc.—via Discord API endpoints (e.g., https://discord[.]com/api/v9/...). This enables stealth credential theft, unauthorized account actions, and potential automated abuse if executed on a user’s system.