Here are the logs we captured. The logs may contain personal information. You can review the content of the files before ...