There is no sequence, he is correlating events which have got nothing to do with each other.I had a hard time analyzing this case. But his last post made the sequence of events clearer.
The malware dll, executable and so on modification dates could be modified. But the archives (likely) with the exfiltrated data were created by a Windows API (or some dependancy in Lumma Stealer, there are many that can be used). It is unlikely that attackers will attempt to modify the archive timestamp, so it can be assumed that the Trojan was there in December.
Short answer to the question is anything damaged: no
Why it wasn’t detected by Kaspersky and MalwareBytes: that question I answered already.
I can only suggest do not follow any tutorials online unless you either know very well what you are doing (in this case you won’t go looking for tutorials) or it comes from a very trusted source.
Bestsoftwarestodayandeveryday.xyz is not a trustworthy source to be looking for tutorials. I would say even youtube isn’t.
For example, unless you know what heuristics means to the level that you can sit down and compose 2-3 whilst you are eating your morning toast, you’ve got no business adjusting heuristic level settings.
Even if Kaspersky missed the trojan, this happens.
The trojan is gone, your data is fine.
Have a bit of late vintage port to calm down and enjoy life.


