Here are the application logs. Watch what happens here when you interact with the vulnerable application.
Application initialized.