http://pke2vht5jdeninupk7i2thcfvxegsue6oraswpka35breuj7xxz2erid.onion/FunkLocker.html
The files are overwritten with their encrypted versions, which cannot be read without the decryption key. Result: The victim’s critical data becomes unusable unless the ransom is paid to receive the decryption key. Demand for Ransom (Extortion): Goal: Force the victim to pay money in exchange for the decryption key.