NEW ETA
Okay let's resume the issue because the thread is a bit messy atm.
The source contain a code to send the POC block reward on the following address: KLMD1gKGK44AGaRq5W8StG4LnhGDLjCfQh
The problem is that coin are actually sending to an other address. Which is not the good one.
It mean the POC is stuck and the miners from this pool are receiving the POC block.
We think it's a malicious attempt as the pool operators aren't responding and as the coins succeed in all our tests.
The pool involved in this has still more than 51% of the hashrate. It's not really a fork because the blocks are indeed the same: it's not about the blocks but about the transactions. This is making this attack not visible directly on the network, because you can't watch a block fork.
If anyone of you is a dev you can find the part of the code on main.cpp line 4443 and 4659.
My advice is to stop mining at the moment, because we failed to get less than 51% on the concerned pool.
We are looking into a solution. Me and my co are actually discussing about this. I also had a long chat on IRC with the peoples there.
We need to restart the coin, but also need time to rework our system to avoid this kind of attack happening twice.
We will make a system to refund the Contributors if they want to get back the BTC.
More details are coming as soon as possible. I'm going to update the OP, I'll keep answering your questions too.
Please don't do useless troll, we will work on a solution.