The Crypt malware is a malicious application which allows hackers to remotely access your computer system (infected device), allowing them to modify files, steal personal information and install additional malware / adware.
Crypt malware is often installed via malicious applications or legitimate applications which have been infected with the Crypt malware.
Once the Crypt malware has been installed on your device – all the files and folders will be locked, making it impossible to read out the data. In order to obtain permission again to access the locked files, the victim will have to pay an specific amount of ransom.
Below you can view a list of domains which are used by the Crypt malware. Please keep in mind that these domains are malicious and that infection might take place once visited.
You can use the information which has been shown above to do some research on the malware.