Analysis Date2018-04-24 19:29:58
MD5ec3f64a12902eb2b9096583a209e2d01
SHA1cd1c9f97bfaf418d036513cb82e5501d9a6a1e36

Static Details:

File typePE32 executable (GUI) Intel 80386, for MS Windows
PEhash
AVArcabit (arcavir)Win32.Sality.3
AVAuthentiumW32/Sality.gen2
AVGrisoft (avg)Error Scanning File
AVAvira (antivir)W32/Sality.AT
AVAlwil (avast)SaliCode
AVAlwil (avast)Win32:SaliCode
AVAd-AwareWin32.Sality.3
AVBitDefenderWin32.Sality.3
AVBullGuardWin32.Sality.3
AVClamAVNo Virus
AVDr. WebWin32.Sector.30
AVEmsisoftWin32.Sality.3
AVMicroWorld (escan)Win32.Sality.3
AVCA (E-Trust Ino)Win32.Sality.3
AVFortinetW32/Sality.BH
AVFrisk (f-prot)W32/Sality.gen2
AVF-SecureWin32.Sality.3
AVIkarusTrojan.Win32.VB
AVK7Virus ( f10001071 )
AVKasperskyVirus.Win32.Sality.gen
AVMalwareBytesBackdoor.Agent.Generic
AVMcafeeW32/Sality.gen.z
AVMicrosoft Security EssentialsTrojanSpy:MSIL/Omaneat.B
AVNANOVirus.Win32.Sality.beygb
AVEset (nod32)Win32/Sality.NBA virus
AVPadvishVirus.Win32.Sality.3
AVCAT (quickheal)W32.Sality.U
AVRisingTrojan.Win32.Swisyn.f
AV360 SafeVirus.Win32.Sality.I
AVSUPERAntiSpywareNo Virus
AVSymantecW32.Gosys
AVTrend MicroPE_SALITY.RL
AVTwisterVirus.FD81@2FF0000@2FF0F.mg
AVVirusBlokAda (vba32)Virus.Win32.Sality.bakc
AVWindows DefenderTrojanSpy:MSIL/Omaneat.B
AVZillya!Virus.Sality.Win32.25

Runtime Details:

Screenshot

Process
↳ C:\Windows\System32\lsass.exe

Process
↳ C:\Users\Phil\AppData\Local\Temp\cd1c9f97bfaf418d036513cb82e5501d9a6a1e36.exe

Creates MutexuxJLpe1m
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝
2
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝
0
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ➝
0
RegistryHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝
0
RegistryHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions ➝
0
RegistryHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications ➝
1
RegistryHKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process\LO ➝
1
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\1818847312 ➝
350
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-657272672 ➝
0
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\1161574640 ➝
0
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-1314545344 ➝
35
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\504301968 ➝
250
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-1971818016 ➝
0700687474703A2F2F7069736F63686E652E6E65742F626F74746F6D2E67696600687474703A2F2F707261626875696E666F746563682E636F6D2F696D616765732F626F74746F6D2E67696600687474703A2F2F77696E6D61726B2E636F2E696E2F696D6167652E67696600687474703A2F2F646F6D2E6C61706F6B2E68752F7064662F696D6167652E67696600687474703A2F2F6167727573652E636F6D2F696D6167652E67696600687474703A2F2F74616E676E68756E672E3530776562732E636F6D2F616E682F696D6167652E67696600687474703A2F2F36372E3232352E3134342E34322F696D616765732F696D6167652E676966
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-152970704 ➝
6CBD6BF3C5AA7FED2DC32A004BB7AA3C95DA67801F6D8F4992454DB02D667618AE6F6ACCDFB52CDDBFC9CAEC403DE9952B153C4F8A9968E05943CAF9F382673079DF960E9E0688302D69F2B5EE2551D4ED814C979EDA48A689DEB98EE9156AE24845054AE92E0C953BF4BBCFBB2A87EF01BD5C1EEBFC6691B757872CE34DBE05
Creates FileC:\Users\Phil\AppData\Local\Temp\~DF9F542F908E32069E.TMP
Creates Filec:\Users\Phil\AppData\Local\Temp\cd1c9f97bfaf418d036513cb82e5501d9a6a1e36.exe
Creates Filec:\Users\Phil\AppData\Local\Temp\cd1c9f97bfaf418d036513cb82e5501d9a6a1e36.exe
Creates Filec:\Windows\system\explorer.exe
Creates FileC:\Windows\system.ini
Creates Filec:\Users\Phil\AppData\Local\Temp\cd1c9f97bfaf418d036513cb82e5501d9a6a1e36.exe
Creates Filec:\Windows\system\explorer.exe

Process
↳ c:\Windows\system\explorer.exe

Creates MutexuxJLpe1m
Creates Mutex
Creates Mutex
Creates MutexuxJLpe1m
Creates Mutexexplorer.exeM_2416_
Creates MutexuxJLpe1m
Creates FileC:\Users\Phil\AppData\Local\Temp\~DF33CAAE978E22D9EB.TMP
Creates Filec:\Windows\system\explorer.exe
Creates Filec:\Windows\system\spoolsv.exe
Creates Filec:\Windows\system\explorer.exe
Creates Filec:\Windows\system\spoolsv.exe
Creates FileC:\Users\Phil\AppData\Roaming\mrsys.exe
Creates FileC:\Windows\system\cmsys.cmn
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer ➝
c:\windows\system\explorer.exe RO
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost ➝
c:\windows\system\svchost.exe RO
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath ➝
C:\Users\Phil\AppData\Roaming\mrsys.exe MR
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden ➝
0

Process
↳ C:\Windows\System32\dwm.exe

Process
↳ c:\Windows\system\spoolsv.exe

Creates MutexuxJLpe1m
Creates Mutex
Creates Mutex
Creates Mutexspoolsv.exeM_464_
Creates MutexuxJLpe1m
Creates FileC:\Users\Phil\AppData\Local\Temp\~DF414925EB2E2387C7.TMP
Creates Filec:\Windows\system\spoolsv.exe
Creates Filec:\Windows\system\svchost.exe
Creates Filec:\Windows\system\spoolsv.exe
Creates Filec:\Windows\system\svchost.exe

Process
↳ C:\Windows\explorer.exe

Creates FileC:\Windows\System32\ieframe.dll
Creates FileC:\Users\Phil\AppData\Local\Microsoft\Windows\WER\ERC\statecache.lock
Creates FileC:\Users\Phil\AppData\Local\Microsoft\Windows\WER\ReportArchive
Creates FileC:\ProgramData\Microsoft\Windows\WER\ReportArchive
Creates FileC:\Users\Phil\AppData\Local\Microsoft\Windows\WER\ERC
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100\CheckSetting ➝
#
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101\CheckSetting ➝
#

Process
↳ c:\Windows\system\svchost.exe

Creates MutexuxJLpe1m
Creates Mutex
Creates Mutex
Creates Mutexsvchost.exeM_2128_
Creates MutexuxJLpe1m
Creates FileC:\Users\Phil\AppData\Local\Temp\~DF973C4CED52C24F93.TMP
Creates Filec:\Windows\system\svchost.exe
Creates Filec:\Windows\system\spoolsv.exe
Creates FileC:\Users\Phil\AppData\Roaming\mrsys.exe
Creates Filec:\Windows\system\svchost.exe
Creates FileC:\Users\Phil\AppData\Roaming\mrsys.exe
Creates FileC:\Windows\system\cmsys.cmn
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer ➝
c:\windows\system\explorer.exe RO
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost ➝
c:\windows\system\svchost.exe RO
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath ➝
C:\Users\Phil\AppData\Roaming\mrsys.exe MR
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden ➝
0

Process
↳ C:\Windows\System32\taskhost.exe

Process
↳ c:\Windows\system\spoolsv.exe

Creates MutexuxJLpe1m
Creates Mutexsmss.exeM_252_
Creates Mutexsmss.exeM_252_
Creates Mutexcsrss.exeM_328_
Creates Mutexcsrss.exeM_328_
Creates Mutexwininit.exeM_376_
Creates Mutexwininit.exeM_376_
Creates Mutexcsrss.exeM_388_
Creates Mutexcsrss.exeM_388_
Creates Mutexwinlogon.exeM_428_
Creates Mutexwinlogon.exeM_428_
Creates Mutexservices.exeM_472_
Creates Mutexservices.exeM_472_
Creates Mutexlsass.exeM_480_
Creates Mutexlsass.exeM_480_
Creates Mutexlsm.exeM_488_
Creates Mutexlsm.exeM_488_
Creates Mutexsvchost.exeM_596_
Creates Mutexsvchost.exeM_596_
Creates Mutexsvchost.exeM_660_
Creates Mutexsvchost.exeM_660_
Creates Mutexsvchost.exeM_712_
Creates Mutexsvchost.exeM_712_
Creates Mutexsvchost.exeM_820_
Creates Mutexsvchost.exeM_820_
Creates Mutexsvchost.exeM_872_
Creates Mutexsvchost.exeM_872_
Creates Mutexaudiodg.exeM_932_
Creates Mutexsvchost.exeM_984_
Creates Mutexsvchost.exeM_984_
Creates Mutexsvchost.exeM_556_
Creates Mutexsvchost.exeM_556_
Creates Mutexdwm.exeM_920_
Creates Mutexexplorer.exeM_688_
Creates Mutexspoolsv.exeM_1108_
Creates Mutexspoolsv.exeM_1108_
Creates Mutextaskhost.exeM_1144_
Creates Mutexsvchost.exeM_1164_
Creates Mutexsvchost.exeM_1164_
Creates Mutexpythonw.exeM_1264_
Creates Mutexsvchost.exeM_1760_
Creates Mutexsvchost.exeM_1760_
Creates Mutexsearchindexer.exeM_1992_
Creates Mutexsearchindexer.exeM_1992_
Creates Mutexwmpnetwk.exeM_852_
Creates Mutexwmpnetwk.exeM_852_
Creates Mutexsvchost.exeM_1436_
Creates Mutexsvchost.exeM_1436_
Creates Mutexsearchfilterhost.exeM_784_
Creates Mutexsearchfilterhost.exeM_784_
Creates Mutexsearchprotocolhost.exeM_1916_
Creates Mutexsearchprotocolhost.exeM_1916_
Creates Mutexpythonw.exeM_2752_
Creates Mutextaskhost.exeM_2272_
Creates Mutextaskhost.exeM_2272_
Creates Mutexexplorer.exeM_2416_
Creates Mutexspoolsv.exeM_464_
Creates Mutexsvchost.exeM_2128_
Creates Mutexspoolsv.exeM_780_
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝
2
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify ➝
1
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝
0
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ➝
0
RegistryHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝
0
RegistryHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions ➝
0
RegistryHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications ➝
1
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\1818847312 ➝
350
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-657272672 ➝
0
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\1161574640 ➝
0
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-1314545344 ➝
35
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\504301968 ➝
250
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-1971818016 ➝
0700687474703A2F2F7069736F63686E652E6E65742F626F74746F6D2E67696600687474703A2F2F707261626875696E666F746563682E636F6D2F696D616765732F626F74746F6D2E67696600687474703A2F2F77696E6D61726B2E636F2E696E2F696D6167652E67696600687474703A2F2F646F6D2E6C61706F6B2E68752F7064662F696D6167652E67696600687474703A2F2F6167727573652E636F6D2F696D6167652E67696600687474703A2F2F74616E676E68756E672E3530776562732E636F6D2F616E682F696D6167652E67696600687474703A2F2F36372E3232352E3134342E34322F696D616765732F696D6167652E676966
RegistryHKEY_CURRENT_USER\Software\Aeky\-521103104\-152970704 ➝
6CBD6BF3C5AA7FED2DC32A004BB7AA3C95DA67801F6D8F4992454DB02D667618AE6F6ACCDFB52CDDBFC9CAEC403DE9952B153C4F8A9968E05943CAF9F382673079DF960E9E0688302D69F2B5EE2551D4ED814C979EDA48A689DEB98EE9156AE24845054AE92E0C953BF4BBCFBB2A87EF01BD5C1EEBFC6691B757872CE34DBE05
Creates FileC:\Users\Phil\AppData\Local\Temp\~DF17873B8856688C8D.TMP

Process
↳ C:\Windows\SysWOW64\at.exe

Creates File\\?\PIPE\atsvc

Network Details:


Raw Pcap
0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .

0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .

0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .

0x00000000 (00000)   504f5354 202f3365 31363236 34372d63   POST /3e162647-c
0x00000010 (00016)   3364382d 34346333 2d393937 622d3061   3d8-44c3-997b-0a
0x00000020 (00032)   63396135 66363838 33322f20 48545450   c9a5f68832/ HTTP
0x00000030 (00048)   2f312e31 0d0a4361 6368652d 436f6e74   /1.1..Cache-Cont
0x00000040 (00064)   726f6c3a 206e6f2d 63616368 650d0a43   rol: no-cache..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2043 6c6f7365   onnection: Close
0x00000060 (00096)   0d0a5072 61676d61 3a206e6f 2d636163   ..Pragma: no-cac
0x00000070 (00112)   68650d0a 436f6e74 656e742d 54797065   he..Content-Type
0x00000080 (00128)   3a206170 706c6963 6174696f 6e2f736f   : application/so
0x00000090 (00144)   61702b78 6d6c0d0a 55736572 2d416765   ap+xml..User-Age
0x000000a0 (00160)   6e743a20 57534441 50490d0a 436f6e74   nt: WSDAPI..Cont
0x000000b0 (00176)   656e742d 4c656e67 74683a20 3733330d   ent-Length: 733.
0x000000c0 (00192)   0a486f73 743a2031 39322e31 36382e31   .Host: 192.168.1
0x000000d0 (00208)   30302e31 34373a35 3335370d 0a0d0a3c   00.147:5357....<
0x000000e0 (00224)   3f786d6c 20766572 73696f6e 3d22312e   ?xml version="1.
0x000000f0 (00240)   30222065 6e636f64 696e673d 22757466   0" encoding="utf
0x00000100 (00256)   2d38223f 3e3c736f 61703a45 6e76656c   -8"?><soap:Envel
0x00000110 (00272)   6f706520 786d6c6e 733a736f 61703d22   ope xmlns:soap="
0x00000120 (00288)   68747470 3a2f2f77 77772e77 332e6f72   http://www.w3.or
0x00000130 (00304)   672f3230 30332f30 352f736f 61702d65   g/2003/05/soap-e
0x00000140 (00320)   6e76656c 6f706522 20786d6c 6e733a77   nvelope" xmlns:w
0x00000150 (00336)   73613d22 68747470 3a2f2f73 6368656d   sa="http://schem
0x00000160 (00352)   61732e78 6d6c736f 61702e6f 72672f77   as.xmlsoap.org/w
0x00000170 (00368)   732f3230 30342f30 382f6164 64726573   s/2004/08/addres
0x00000180 (00384)   73696e67 2220786d 6c6e733a 6c6d733d   sing" xmlns:lms=
0x00000190 (00400)   22687474 703a2f2f 73636865 6d61732e   "http://schemas.
0x000001a0 (00416)   6d696372 6f736f66 742e636f 6d2f7769   microsoft.com/wi
0x000001b0 (00432)   6e646f77 732f6c6d 732f3230 30372f30   ndows/lms/2007/0
0x000001c0 (00448)   38223e3c 736f6170 3a486561 6465723e   8"><soap:Header>
0x000001d0 (00464)   3c777361 3a546f3e 75726e3a 75756964   <wsa:To>urn:uuid
0x000001e0 (00480)   3a336531 36323634 372d6333 64382d34   :3e162647-c3d8-4
0x000001f0 (00496)   3463332d 39393762 2d306163 39613566   4c3-997b-0ac9a5f
0x00000200 (00512)   36383833 323c2f77 73613a54 6f3e3c77   68832</wsa:To><w
0x00000210 (00528)   73613a41 6374696f 6e3e6874 74703a2f   sa:Action>http:/
0x00000220 (00544)   2f736368 656d6173 2e786d6c 736f6170   /schemas.xmlsoap
0x00000230 (00560)   2e6f7267 2f77732f 32303034 2f30392f   .org/ws/2004/09/
0x00000240 (00576)   7472616e 73666572 2f476574 3c2f7773   transfer/Get</ws
0x00000250 (00592)   613a4163 74696f6e 3e3c7773 613a4d65   a:Action><wsa:Me
0x00000260 (00608)   73736167 6549443e 75726e3a 75756964   ssageID>urn:uuid
0x00000270 (00624)   3a623534 32373536 332d3530 38352d34   :b5427563-5085-4
0x00000280 (00640)   6464342d 39653337 2d393334 65633966   dd4-9e37-934ec9f
0x00000290 (00656)   33656136 643c2f77 73613a4d 65737361   3ea6d</wsa:Messa
0x000002a0 (00672)   67654944 3e3c7773 613a5265 706c7954   geID><wsa:ReplyT
0x000002b0 (00688)   6f3e3c77 73613a41 64647265 73733e68   o><wsa:Address>h
0x000002c0 (00704)   7474703a 2f2f7363 68656d61 732e786d   ttp://schemas.xm
0x000002d0 (00720)   6c736f61 702e6f72 672f7773 2f323030   lsoap.org/ws/200
0x000002e0 (00736)   342f3038 2f616464 72657373 696e672f   4/08/addressing/
0x000002f0 (00752)   726f6c65 2f616e6f 6e796d6f 75733c2f   role/anonymous</
0x00000300 (00768)   7773613a 41646472 6573733e 3c2f7773   wsa:Address></ws
0x00000310 (00784)   613a5265 706c7954 6f3e3c77 73613a46   a:ReplyTo><wsa:F
0x00000320 (00800)   726f6d3e 3c777361 3a416464 72657373   rom><wsa:Address
0x00000330 (00816)   3e75726e 3a757569 643a6337 63616536   >urn:uuid:c7cae6
0x00000340 (00832)   65352d64 6361382d 34396562 2d623063   e5-dca8-49eb-b0c
0x00000350 (00848)   612d6362 36623935 39613564 66313c2f   a-cb6b959a5df1</
0x00000360 (00864)   7773613a 41646472 6573733e 3c2f7773   wsa:Address></ws
0x00000370 (00880)   613a4672 6f6d3e3c 6c6d733a 4c617267   a:From><lms:Larg
0x00000380 (00896)   654d6574 61646174 61537570 706f7274   eMetadataSupport
0x00000390 (00912)   2f3e3c2f 736f6170 3a486561 6465723e   /></soap:Header>
0x000003a0 (00928)   3c736f61 703a426f 64792f3e 3c2f736f   <soap:Body/></so
0x000003b0 (00944)   61703a45 6e76656c 6f70653e            ap:Envelope>


Strings