As security is a concern, might I suggest learning a little more about and some thought spent toward better securing your environment?
This thought starts with robust and unique Apple ID password, as folks get in trouble with password re-use, and with poorly-chosen passwords, and passwords that otherwise become known to others. passwords are utterly fundamental to your security. Remote access into your Mac is, well, easiest when the attacker knows or can guess your password. Re-using passwords is a great way to get in deep trouble.
Work through the Apple password security recommendations, too. Password security recommendations - Apple Support
Beyond robust and unique passwords, enabling two-factor authentication can give you a “last chance” defense against account takeover, if the miscreant has acquired or guessed your Apple ID and password through phishing or otherwise.
What’s phishing, you might ask? Recognize and avoid phishing messages, phony support calls, and other scams - Apple Support
Another important step toward upgrading your security is to have Time Machine or other backups configured and running. Preferably with decent storage capacity allocated to Time Machine to allow some depth of backups, too.
If your information is important enough to warrant additional backups, have rotating backups and some of which are disconnected and kept off-site and rotated back. This as backups are your recovery path from security breaches, from accidents and other causes of data loss, and as it’s a whole lot harder to damage (or flood, or burn, or wind) not-local and disconnected backups.
Here are some steps that Apple suggests for upgrading your own security, when personal security really matters:
Device and Data Access when Personal Safety is At Risk
Wading through logs is approximately futile for most issues, until you know more about what sort of attack you’re looking for. Logs have massive amounts of cryptically- or scarily-worded data, much of which is only useful to the app developers and to Apple, at most. You’re looking for a needle in a whole lot of haystacks, and without really being sure of what the particular needle you’re seeking even looks like.
From the provided log, I see a whole lot of Spotlight chatter, which is usually normal.
From the log, I also see Avast installed, which is of a class of apps that I generally don’t recommend installing, and that I would remove. Avast is blocking some activities which appear normal, as well. Avast in particular has had some privacy surprises, too.
Here is some anti-malware-related related reading: Effective defenses against malware and other threats - Apple Community
As for the files ending up in the trash, I tend to cause that myself when I’m deleting one or more files, and mistakenly select one or more additional files I hadn’t intended to delete. Backups are helpful here too, as Time Machine with decent depth-of-backups allows you to recover files even after the trash has been emptied.