Search Donkey

Search Donkey Description

Search Donkey is a browser add-on/potentially unwanted program that was produced by WebAppTech Coding, LLC. Search Donkey declares to offer Internet users more browsing options for Internet Explorer, Mozilla Firefox and Google Chrome. Search Donkey infiltrates into the affected computer system together with other freeware applications without the PC user's permission. When inside the compromised PC, Search Donkey makes modifications to the compromised Internet browser when the web user is making an online search or visiting particular websites. Search Donkey will illustrate a drop-down menu, which is called 'Best Search'. Although Search Donkey is not a harmful program, it is still added to the list of applications that security researchers advise to uninstall from the computer system. Search Donkey can lead to annoying diversions to tricky websites where Internet users can get their computers corrupted by a variety of malware infections. Also, Search Donkey can trace the victimized computer user's browsing habits and, thus, breach the target computer user's privacy. Search Donkey can easily obtain access to the attacked computer user's login information and also sell the data about the target PC user's most visited websites to the third parties. Search Donkey will deliver pop-up advertisements on the compromised PC.

Technical Information

File System Details

Search Donkey creates the following file(s):
# File Name Size MD5 Detection Count
1 %ALLUSERSPROFILE%\SearchDonkey\up\2.6.80\SearchDonkeyService.exe 48,545 2e256b6a5a21993547ab56f9f65ef245 1

Registry Details

Search Donkey creates the following registry entry or registry entries:
Registry key
Software\Microsoft\Internet Explorer\Approved Extensions\{44ED99E2-16A6-4B89-80D6-5B21CF42E78B}

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.