Is "Dynatrace Real User Monitoring" on Microsoft Edge Add-ons Safe to Install?

Dynatrace LLC · edge · v1.6.2

If you’re already a Dynatrace customer, you can use the Dynatrace Real User Monitoring extension right away. If you’re new to Dynatrace, you can start your free trial at www.dynatrace.com/trial.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

165 security findings detected across all analyzers

Severity Breakdown

0
Critical
48
High
84
Medium
0
Low
0
Info

Finding Categories

48
Malware Signatures
6
Network
78
IoC Indicators

YARA Rules Matched

8 rules(48 hits)
postinstall file manipulation postinstall network communication LocalStorageShouldNotBeUsed postinstall file download postinstall system command postinstall obfuscation postinstall crypto operations postinstall environment access

Detailed Findings

87 total

YARA Rule Matches

8 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
18
IP Addresses
3
Domains
44
Strings
78

All Indicators · 78

Hash
detected MD5 Hash: D4F9E66F302C11E99D9685A070736C67

XIOC detected MD5 Hash: D4F9E66F302C11E99D9685A070736C67

extracted_from_files

Domain
detected Domain: expandable.is

XIOC detected Domain: expandable.is

extracted_from_files

Hash
detected MD5 Hash: 23534E41302D11E99D9685A070736C67

XIOC detected MD5 Hash: 23534E41302D11E99D9685A070736C67

extracted_from_files

Hash
detected MD5 Hash: 23534E43302D11E99D9685A070736C67

XIOC detected MD5 Hash: 23534E43302D11E99D9685A070736C67

extracted_from_files

Hash
detected MD5 Hash: D4F9E670302C11E99D9685A070736C67

XIOC detected MD5 Hash: D4F9E670302C11E99D9685A070736C67

extracted_from_files

Hash
detected MD5 Hash: D4F9E66D302C11E99D9685A070736C67

XIOC detected MD5 Hash: D4F9E66D302C11E99D9685A070736C67

extracted_from_files

Hash
detected MD5 Hash: D4F9E66E302C11E99D9685A070736C67

XIOC detected MD5 Hash: D4F9E66E302C11E99D9685A070736C67

extracted_from_files

URL
detected URL: https://www.dynatrace.com

XIOC detected URL: https://www.dynatrace.com

extracted_from_files

URL
detected URL: https://js-cdn.dynatracelabs.com/jstag/14c129c054c/gmg80500/1481757a8c2f5436_complete.js

XIOC detected URL: https://js-cdn.dynatracelabs.com/jstag/14c129c054c/gmg80500/1481757a8c2f5436_complete.js

extracted_from_files

Hash
detected MD5 Hash: 1EB23183B81711E382589565544F7ED0

XIOC detected MD5 Hash: 1EB23183B81711E382589565544F7ED0

extracted_from_files

Hash
detected MD5 Hash: 1EB23184B81711E382589565544F7ED0

XIOC detected MD5 Hash: 1EB23184B81711E382589565544F7ED0

extracted_from_files

Hash
detected MD5 Hash: 1EB23181B81711E382589565544F7ED0

XIOC detected MD5 Hash: 1EB23181B81711E382589565544F7ED0

extracted_from_files

Hash
detected MD5 Hash: 1EB23182B81711E382589565544F7ED0

XIOC detected MD5 Hash: 1EB23182B81711E382589565544F7ED0

extracted_from_files

Hash
detected MD5 Hash: 23534E42302D11E99D9685A070736C67

XIOC detected MD5 Hash: 23534E42302D11E99D9685A070736C67

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_003_Checkmark_disabled.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_003_Checkmark_disabled.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownclosed_downwards.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownclosed_downwards.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownopen.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownopen.svg);

extracted_from_files

URL
detected URL: https://github.com/promises-aplus/promises-spec#the-promise-resolution-procedure

XIOC detected URL: https://github.com/promises-aplus/promises-spec#the-promise-resolution-procedure

extracted_from_files

URL
detected URL: https://

XIOC detected URL: https://

extracted_from_files

URL
detected URL: https://js-cdn.dynatracelabs.com;

XIOC detected URL: https://js-cdn.dynatracelabs.com;

extracted_from_files

Domain
detected Domain: tab.is

XIOC detected Domain: tab.is

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/dropdown_open.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/dropdown_open.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/dropdown_open-white.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/dropdown_open-white.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_002_Search_Magnifying_glass.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_002_Search_Magnifying_glass.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_001_Abort_turquoise.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_001_Abort_turquoise.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_001_Abort_turquoise_700.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_001_Abort_turquoise_700.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_003_Checkmark_turquoise.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_003_Checkmark_turquoise.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_003_Checkmark_white.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/Icons_file_003_Checkmark_white.svg);

extracted_from_files

Domain
detected Domain: dynatrace.com

XIOC detected Domain: dynatrace.com

extracted_from_files

Domain
detected Domain: js-cdn.dynatracelabs.com

XIOC detected Domain: js-cdn.dynatracelabs.com

extracted_from_files

Domain
detected Domain: currentappconfigtext.select

XIOC detected Domain: currentappconfigtext.select

extracted_from_files

Domain
detected Domain: www.dynatrace.com

XIOC detected Domain: www.dynatrace.com

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownclosed.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownclosed.svg);

extracted_from_files

URL
detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownclosed_grey.svg);

XIOC detected URL: https://assets.dynatrace.com/groundhog/v2.1.3/assets/images/icons/icons_file_002_dropdownclosed_grey.svg);

extracted_from_files

Domain
detected Domain: el.dataset.target

XIOC detected Domain: el.dataset.target

extracted_from_files

Domain
detected Domain: trimmedresults.map

XIOC detected Domain: trimmedresults.map

extracted_from_files

Domain
detected Domain: array.prototype.indexof.call

XIOC detected Domain: array.prototype.indexof.call

extracted_from_files

Domain
detected Domain: input.name

XIOC detected Domain: input.name

extracted_from_files

Domain
detected Domain: th.map

XIOC detected Domain: th.map

extracted_from_files

Domain
detected Domain: ev.target

XIOC detected Domain: ev.target

extracted_from_files

Domain
detected Domain: button.tab

XIOC detected Domain: button.tab

extracted_from_files

Domain
detected Domain: then.call

XIOC detected Domain: then.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: callback.call

XIOC detected Domain: callback.call

extracted_from_files

Domain
detected Domain: body.call

XIOC detected Domain: body.call

extracted_from_files

Domain
detected Domain: xhr.open

XIOC detected Domain: xhr.open

extracted_from_files

Domain
detected Domain: array.prototype.foreach.call

XIOC detected Domain: array.prototype.foreach.call

extracted_from_files

Domain
detected Domain: bar.is

XIOC detected Domain: bar.is

extracted_from_files

Domain
detected Domain: item.is

XIOC detected Domain: item.is

extracted_from_files

Domain
detected Domain: trigger.is

XIOC detected Domain: trigger.is

extracted_from_files

Domain
detected Domain: tbody.is

XIOC detected Domain: tbody.is

extracted_from_files

Domain
detected Domain: switch.to

XIOC detected Domain: switch.to

extracted_from_files

IP
detected IP: e::

XIOC detected IP: e::

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: assets.dynatrace.com

XIOC detected Domain: assets.dynatrace.com

extracted_from_files

Domain
detected Domain: layout.is

XIOC detected Domain: layout.is

extracted_from_files

Hash
detected MD5 Hash: 23534E40302D11E99D9685A070736C67

XIOC detected MD5 Hash: 23534E40302D11E99D9685A070736C67

extracted_from_files

Domain
detected Domain: expandable--separated.is

XIOC detected Domain: expandable--separated.is

extracted_from_files

Domain
detected Domain: expandable--nav.is

XIOC detected Domain: expandable--nav.is

extracted_from_files

Domain
detected Domain: expandable--subnav.is

XIOC detected Domain: expandable--subnav.is

extracted_from_files

Domain
detected Domain: span.id

XIOC detected Domain: span.id

extracted_from_files

Domain
detected Domain: window.performance.now

XIOC detected Domain: window.performance.now

extracted_from_files

Domain
detected Domain: d.id

XIOC detected Domain: d.id

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: event.data

XIOC detected Domain: event.data

extracted_from_files

Domain
detected Domain: window.top

XIOC detected Domain: window.top

extracted_from_files

Domain
detected Domain: message.data

XIOC detected Domain: message.data

extracted_from_files

IP
detected IP: d::

XIOC detected IP: d::

extracted_from_files

IP
detected IP: ea::

XIOC detected IP: ea::

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: sender.tab

XIOC detected Domain: sender.tab

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: slice.call

XIOC detected Domain: slice.call

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

URL
detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

XIOC detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Dynatrace Real User Monitoring is a edge extension published by Dynatrace LLC. Version 1.6.2 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 165 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 48 finding(s)
  • Medium: 84 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Dynatrace Real User Monitoring is published by Dynatrace LLC on the edge marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions