The OSX/RSplug.A (or OSX/DNSchanger or OSX/Zlob, dependong on who you ask) malware might or might not continue to function, dependong on how DNScrypt works. The malware tells your computer to use its name servers; I don't know if the DNScrypt software prevents it from making that change, or makes all name server queries encrypted (which would break the malware, since I don't believe the hostile name servers can use encryption).
Fortunately, the FBI, working with overseas law enforcement, recently
broke up the Zlob gang, which caused me to do a little dance. Though it also means that I don't know the answer to your question, asdly.
DNScrypt's list of "current name servers" is the list of name servers your computer is currently using.