[.SQL] ASML.COM ~154 DB's - Leaked, Download!
by 1011 - Tuesday January 6, 2026 at 10:02 PM
#1
https://hightechcampus.com/storage/903/A...0316-2.jpg

Hi BreachForums Community,

Today i am leaking ASML.COM ~154 DB's.

ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.


The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.

The compromissed data are:

- Disk Encryption keys
- users
- software, and etc.
- devices



Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client    = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
  `host_id` int unsigned NOT NULL,
  `base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
  `base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  `key_slot` tinyint unsigned DEFAULT NULL,
  `decryptable` tinyint(1) DEFAULT NULL,
  `created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
  `updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
  `reset_requested` tinyint(1) NOT NULL DEFAULT '0',
  `client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  PRIMARY KEY (`host_id`),
  KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;



Download:

Hidden Content
You must register or login to view this content.


This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
#2
Could be huge, good job
[Image: Banner-Glow-245161638.png]
@Psych1c  @m3nt4l
#3
who can dare to do this?
#4
Did anyone download it? Is that true?
#5
(Jan 06, 2026, 10:02 PM)1011 Wrote: https://hightechcampus.com/storage/903/A...0316-2.jpg

Hi BreachForums Community,

Today i am leaking ASML.COM ~154 DB's.

ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.


The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.

The compromissed data are:

- Disk Encryption keys
- users
- software, and etc.
- devices



Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client    = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
  `host_id` int unsigned NOT NULL,
  `base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
  `base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  `key_slot` tinyint unsigned DEFAULT NULL,
  `decryptable` tinyint(1) DEFAULT NULL,
  `created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
  `updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
  `reset_requested` tinyint(1) NOT NULL DEFAULT '0',
  `client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  PRIMARY KEY (`host_id`),
  KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;



Download:

thanks for the leak
#6
Look bro, if you're going to share something like this, you should include more examples, otherwise it's not convincing
#7
based on the sample I doubt that this is legit, I guess we'll wait and see

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
#8
points are required to download this, which I don’t have.
taking a look at the sample only, I’m honestly not convinced it’s legit.
from past leaks, the formatting and field structure usually look different.
xact details like timestamps and consistent IDs seem to be missing here.
question is, can anyone who downloaded it confirm authenticity?
#9
Did anyone download it?

Thank you for sharing this information with the community
#10
Thanks for this 


quote="1011" pid='1242734' dateline='1767736979']
https://hightechcampus.com/storage/903/A...0316-2.jpg

Hi BreachForums Community,

Today i am leaking ASML.COM ~154 DB's.

ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.


The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.

The compromissed data are:

- Disk Encryption keys
- users
- software, and etc.
- devices



Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client    = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
  `host_id` int unsigned NOT NULL,
  `base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
  `base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  `key_slot` tinyint unsigned DEFAULT NULL,
  `decryptable` tinyint(1) DEFAULT NULL,
  `created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
  `updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
  `reset_requested` tinyint(1) NOT NULL DEFAULT '0',
  `client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  PRIMARY KEY (`host_id`),
  KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;



Download:


[/quote]

Thanks for this 


quote="1011" pid='1242734' dateline='1767736979']
https://hightechcampus.com/storage/903/A...0316-2.jpg

Hi BreachForums Community,

Today i am leaking ASML.COM ~154 DB's.

ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.


The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.

The compromissed data are:

- Disk Encryption keys
- users
- software, and etc.
- devices



Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client    = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
  `host_id` int unsigned NOT NULL,
  `base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
  `base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  `key_slot` tinyint unsigned DEFAULT NULL,
  `decryptable` tinyint(1) DEFAULT NULL,
  `created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
  `updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
  `reset_requested` tinyint(1) NOT NULL DEFAULT '0',
  `client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
  PRIMARY KEY (`host_id`),
  KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;



Download:


[/quote]

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.


Possibly Related Threads…
Thread Author Replies Views Last Post
  [Russian] Kari Club Database [1.3M] - Leaked, Download! (REPOST!) Addka72424 9 3,443 Feb 10, 2026, 06:11 PM
Last Post: pine
  FRANCE - Site: ciffrebona.fr 70k pass decripté selluk 7 303 Feb 10, 2026, 06:07 PM
Last Post: pine
  [FR] Verified identity Dataset -Age-Verified-Accounts-City Filter:MAING thomasvalmorin2828 4 231 Feb 10, 2026, 04:47 PM
Last Post: pine
  [FR] Go.Customers-alliance.com Sahquelfou 26 1,030 Feb 10, 2026, 12:55 PM
Last Post: pine
  [FR] SALE 500 users certify Binance “Complete Information” 2026. Surgical strike. Gro Shark888 1 160 Feb 10, 2026, 11:03 AM
Last Post: pine

Forum Jump:


 Users browsing this forum: 1 Guest(s)