Skip to content
QUALIFIED TRUST SERVICES

Legally compliant digital signatures (eIDAS) to drive forward the digitalization of your business processes.

CORPORATE TRUST SERVICES

Cryptography-based trust services
to protect your digital identities,
data and business secrets.

Qualified electronic signature products based on eIDAS - legally binding and secure.

API GUIDE

Upgrade your application with electronic signatures by primesign.





DOCUMENT SIGNING API

Signing of PDF documents. primesign handles document processing and adds a visual signature stamp.

HASH SIGNING API

Signing of hash values. Your application handles document processing and provides the document viewer.

CASH BOX API

RKSV-compliant JWS- or raw signatures for cash box receipts.





primesign TRUST CENTER

All documents for our qualified trust services, certificate revocation list, root-/CA- certificates, etc.

RESOURCES

Fact sheets, product documentation and more.



Nwbgf.7z

The string "Nwbgf" appears to be a randomized or encoded identifier. If you are researching this specific file, it likely pertains to one of the following contexts: 1. Potential Malware or Phishing Indicator

Files with randomized names like Nwbgf.7z are frequently used in or phishing campaigns . Nwbgf.7z

The .7z format is popular for its and strong AES-256 encryption capabilities. The string "Nwbgf" appears to be a randomized

7-Zip has historically faced security scrutiny, including critical vulnerabilities that could allow cyber actors to execute code outside of intended folders. A paper on a specific .7z file might be a demonstrating such an exploit. 7zip Malware: Beware 7zip.com 7zip Malware: Beware 7zip

While there is no widely known academic or technical paper specifically titled "," this filename follows the structure of a compressed archive created by 7-Zip .

Malicious actors have been known to distribute infected versions of legitimate tools, such as the fake 7-Zip installers found on "7zip.com" (a fraudulent site).

It is often used to bundle sensitive documents or datasets where the filename Nwbgf acts as a "nonsensical" label to obscure the archive's actual contents from casual observation. 3. Software Vulnerability Context