Binary Format request captured using loadrunner

Hi Team,

we observed requests are captured in binary format while recording onestream application in SAAS. unable to see which session id or any unique value from server. 
recorded the flow multiple times but still not understanding what are the values changing. do we have any conversion for this?

Sample request:

web_custom_request("UserActivityAjaxService.svc", 
        "URL=">sic.onestreamcloud.com/.../UserActivityAjaxService.svc", 
        "Method=POST", 
        "TargetFrame=", 
        "Resource=0", 
        "RecContentType=application/soap+msbin1", 
        "Referer=", 
        "Snapshot=t4.inf", 
        "Mode=HTML", 
        "EncType=application/soap+msbin1", 
        "BodyBinary=V\\x02\\x0B\\x01s\\x04\\x0B\\x01a\\x06V\\x08D\n\\x1E\\x00\\x82\\x99L">onestream.com/.../"
        "XMLSchema-instance@\\x07XfBytes\\xA00\\x03\\x00\\x00\\x00\\x003"\\x01!5#;eo\\x10\\x12*\n49\\x19\\x100\\x17\\x06!]\\x05_\\x0C][\\x0EYY"">-sic.onestreamcloud.com/OneStreamWeb@\\x02\\x00\\x00\\xC1V\\xDC\\x83\\x8A\\x1D\\xDA\\x83\\x81\\xD9\\xE9\\x18\\x93\\x00\\xF6\\xBE\\xFE\\xAAM\\xA79$\\xE7\\x80\\x13J8fFY\\xF6\\x9B
        "[\\x0EIAFABCO\\x15JAJIM\\x1FNH\\xB7\\xB0\\xE1\\xB1\\xB0\\xBD\\xB6\\xB5\\xA7\\xB9\\xB2\\xA4\\xBE\\xBD\\xBC\\xBB\\xB0\\xA1\\xA7\\xA9\\xA5\\xA3\\xAC\\xA2\\xA9\\xAB\\xA8\\xA8\\xFE\\xA9\\xA6\\xA6\\xC6\\x99\\x9A\\xC0\\xC7\\x91\\xC4\\x94\\xCB\\x91\\xCB\\x92\\xCE\\xCB\\x9B\\x9D\\x89\\x88\\xD4\\x87\\x8C\\x86\\xD4\\x8F\\x8F\\xCF\\xCA\\xCF\\xE3\\xC9\\xDB\\xCC\\xB4\\x93\\x8F\\xA5\\xAF\\xAA\\xBE\\xAF\\xB1\\xAD\\x8D\\x9E\\x98\\xB9\\xA4\\x96\\xA7\\x86\\xB0\\x9D\\x95\\x8F\\x99\\xBB\\xEE\\xAA\\x89\\xA9\\xBD\\xAB\\"
        "xB3\\xED\\xD7\\xA8\\xAA\\x92\\xB2\\x8C\\x81\\xA1\\x98\\xB8\\x9F\\x8E\\xA9\\xD5\\x8D\\xD7\\x94\\xC5\\xC3\\x96\\xC1\\xC1\\xC3\\x96\\xC1\\xC9\\xCE\\xC9\\xCA\\xCB\\xC7\\x9D29215g60?8i985>=?!*<&%$#8)/!-+$*\\x11\\x13\\x10\\x10F\\x11\\x1E\\x1EN\\x11\\x12HO\\x19L\\x1CS\tS\nVS\\x03\\x05\\x01\\x00\\\\\\x0F\\x04\\x0E\\\\\\x07w727\\x1B1#4<\\x1B\\x07-'\"6')5\\x15\\x06\\x00!<\\x0E/\\x0E8\\x15\\x1D\\x07\\x113V\\x121\\x11\\x05\\x13\\x0BU_ \"\\x1A:\\x04\t)\\x00 "
        "\\x07\\x161M\\x15O\\x1CMK\\x1EIIK\\x1E\\xB9\\xB1\\xB6\\xB1\\xB2\\xB3\\xBF\\xE5\\xBA\\xB1\\xBA\\xB9\\xBD\\xEF\\xBE\\xB8\\xA7\\xA0\\xF1\\xA1\\xA0\\xAD\\xA6\\xA5\\xB7\\xA9\\xA2\\xB4\\xAE\\xAD\\xAC\\xAB\\x80\\x91\\x97\\x99\\x95\\x93\\x9C\\x92\\x99\\x9B\\x98\\x98\\xCE\\x99\\x96\\x96\\xD6\\x89\\x8A\\xD0\\xD7\\x81\\xD4\\x84\\xDB\\x81\\xDB\\x82\\xDE\\xDB\\x8B\\x8D\\xF9\\xF8\\xA4\\xF7\\xFC\\xF6\\xA4\\xFF\\xFF\\xBF\\xBA\\xBF\\x93\\xB9\\xAB\\xBC\\xA4\\x83\\x9F\\xB5\\xBF\\xBA\\xAE\\xBF\\xA1\\xBD\\x9D\\x8E\\x8"
        "8\\xA9\\xB4\\x86\\x97\\xB6\\x80\\xAD\\xA5\\xBF\\xA9\\x8B\\xDE\\x9A\\xB9\\x99\\x8D\\x9B\\x83\\xDD\\xC7\\xB8\\xBA\\x82\\xA2\\x9C\\x91\\xB1\\x88\\xA8\\x8F\\x9E\\xB9\\xC5\\x9D\\xC7d53f113f19>9:;7m\")\"!%w& /(y)(%.-\\x0F\\x11\\x1A\\x0C\\x16\\x15\\x14\\x13\\x08\\x19\\x1F\\x11\\x1D\\x1B\\x14\\x1A\\x01\\x9FH;\"\\xCC\\x88<K\\x8A\\x9B\\xF5)\\x9FH;\\x87\\x08user_testT\\x1E\\xD4\\xC8\\x90ZfB\\x9B(\\x02\\x1B\\x07q\\xC2H\\xCB.\\xB2(e"
        "(\\xDC\\x08\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x05en-US\\x02\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xF0\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\xFF\\x03\\x00\\x00\\x00\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF"
        "\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x19\\xFC\\xFF\\xFF\\x01\\x01@\"isSilverlightOrTheActiveWindowsApp\\x85\\x01\\x01\\x01", 
        LAST);