Skip to content
QUALIFIED TRUST SERVICES

Legally compliant digital signatures (eIDAS) to drive forward the digitalization of your business processes.

CORPORATE TRUST SERVICES

Cryptography-based trust services
to protect your digital identities,
data and business secrets.

Qualified electronic signature products based on eIDAS - legally binding and secure.

API GUIDE

Upgrade your application with electronic signatures by primesign.





DOCUMENT SIGNING API

Signing of PDF documents. primesign handles document processing and adds a visual signature stamp.

HASH SIGNING API

Signing of hash values. Your application handles document processing and provides the document viewer.

CASH BOX API

RKSV-compliant JWS- or raw signatures for cash box receipts.





primesign TRUST CENTER

All documents for our qualified trust services, certificate revocation list, root-/CA- certificates, etc.

RESOURCES

Fact sheets, product documentation and more.



Pflaumenmus_18.rar Apr 2026

Because the origin and contents of this specific file are unknown, you should treat it with extreme caution. Compressed archives (like .rar files) are frequently used to deliver malware.

The file appears to be a compressed archive, but there is no widely documented or "official" report associated with this specific filename in public security databases or general knowledge. The name translates from German to "Plum Jam 18." Pflaumenmus_18.rar

Upload the file to VirusTotal to see if any of the 70+ antivirus engines recognize it as malicious. Because the origin and contents of this specific

Be wary of "double extensions" (e.g., Pflaumenmus_18.rar.exe ). Windows often hides known extensions, making an executable file look like a simple archive. The name translates from German to "Plum Jam 18

If this file was sent via an unsolicited message (e.g., Facebook, Discord, or email), it is highly likely to be a scam or malware designed to steal account cookies or credentials. Technical Context

If you have encountered this file and are unsure of its safety, follow these steps to generate your own report:

Simply downloading the file is generally safe, but extracting its contents or running any executable files inside can infect your system.