Transaction

Hash
52c9aae3b62467830cde08bd21fe4b9645c3b0b47296f6e48f8332ad95eba20d
Block
610801 · 2019-11-26 21:05 · 43,753 confirmations
Data
memo-like
Size
237 bytes
Fee
238 sats (1.00421941 sat/B)

304d
#Monero #XMR “I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet. I downloaded the build yesterday around 6pm Pacific time.”

Inputs (1)

Index
0
Previous Output
304402204522c0e3d6112d37807cbb5516ea0db06dae0d91286ef40324a3379e636e89ff0220212fbd655423c5a91c45da525e6a0aa44a2f56310dcb9f5385a63ce83cfd701c41 037abfe6bd80c86ae7b93bde3b81a5bc5be7df4f3f687ab79eea9052884821763b

Outputs (2)

Index
0
Type
OP_RETURN
OP_RETURN 6d04 4f7237def018941c9c1a8bd16be0295eb4f654b6cf7f6f69b13fcaa505f269c7
Index
1
OP_DUP OP_HASH160 ccb0abb380809d9cf6bf782b10f2701c27c2c204 OP_EQUALVERIFY OP_CHECKSIG

Raw

01000000012c4e296e6ebacfcddde0e615b1b7432e5e018ab6e00107a5363ce27be27ff4b8010000006a47304402204522c0e3d6112d37807cbb5516ea0db06dae0d91286ef40324a3379e636e89ff0220212fbd655423c5a91c45da525e6a0aa44a2f56310dcb9f5385a63ce83cfd701c4121037abfe6bd80c86ae7b93bde3b81a5bc5be7df4f3f687ab79eea9052884821763bffffffff020000000000000000256a026d04204f7237def018941c9c1a8bd16be0295eb4f654b6cf7f6f69b13fcaa505f269c71d530000000000001976a914ccb0abb380809d9cf6bf782b10f2701c27c2c20488ac00000000