Refer to the exhibit.
A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download.
Which filter did the engineer apply to sort the Wireshark traffic logs?
B.