The Techy BlogBloom

Chew-WGA 0.6 – Yet Another Windows 7 Activator

Published on Tuesday, August 11, 2009 by

Well yet another Windows 7 Activator by anemeros has made its way out onto the internet. As I have already pre-ordered a copy of Windows 7 I will not be trying this. Please feel free to comment below with how you got on with this. Also I will NOT be providing a download link for this, Google is your friend.

Windows 7 Activated Windows 7 Activator

Filename: Chew-WGA.exe
File size: 2127244 bytes
MD5: a5358c3b3440c2adda3c585f9a63eae0
SHA1: 947e5e6258c20232337a02a938276f8c25cbaeca
SHA256: bd5487e2b5fb95d7ae949270cb1cbd57d01d709ecbb2c32087a3471cf15b460b

Filename: Chew-WGA (debug).exe
File size: 2127244 bytes
MD5: 2f041e9197c7a3ca2c0836d73f73d3db
SHA1: 6365a14ac262668b28675193f2d5edac19a7c2df
SHA256: 96dfe0503386624b6f0c080bbbc1c61835fe3a98a1d2cf0088ffccaf885f7ab1

This is an experimental script, and is intended for educational purposes only. So far, this tool has only been tested on release candidate builds of Windows 7. The current version (0.6) is not intended for use on earlier or future operating systems. This tool should never be executed on an operating system that is intended for continual use. Use of Chew-WGA is at your own risk. C.H.E.W. (Computer Hindering Effectuality on Windows) was designed to test the security resistance of various software protections built in to the Windows operating system. All versions of this tool have been designed for testing only on Microsoft Windows versions 6.1.6519 – 6.1.7600 (Windows 7).

There have been mixed outcomes to the tests run by this application, with the largest cause of variation from expected results seemingly caused by a deviation from instruction; the next most prominent being the processor architecture (32 bit / 64 bit); the next most common cause of variation is the target system having been previously modified in software protection platform settings or otherwise; next is the target build variation (structural differences in file system or registry); and least common, the unique brand or hardware setup of the target system itself.

Some users have reported that Windows software protections react effectively to attempts at system file changes, resulting in an immediate reduction of normal features, along with notices of non-genuine status (notification mode).

Other testers have reported that some or all of the following were deactivated, disabled, removed, or modified:

  • Desktop watermark version and status reminder
  • System properties expiration reminder
  • Windows version tool expiration reminder
  • System tray notifications of “Genuine” status
  • Logon notifications of “Genuine” status
  • Tokens certificate table
  • Activation schedule
  • Activation interval
  • Activation notice
  • Software protection platform plug-ins
  • Product feedback tool

It seems Microsoft Windows NT based systems are particularly susceptible for these types of system changes, due to the simple accessibility of system files and Windows registry from within the user environment. With the current design, users have full rights to files and settings that should be more intently guarded to prevent tampering, and any protections that are in place can be easily undone with standard administration tools that are in fact produced and distributed by Microsoft.

Run %windir%\System32\UserAccountControlSettings.exe Set to “Never notify” and click OK. If UAC pops up, allow the change as Administrator. Then restart your computer, even if you are not prompted to do so.

Run %windir%\System32\slmgr.vbs -xpr Write down the expiration or grace period information, perhaps on a sticky note. If slmgr.vbs is not working, try “winver.exe” instead to get this information.

You are encouraged to upload both “Chew-WGA.exe” and “Chew-WGA (debug).exe” to and verifying that the MD5, SHA1, and SHA256 software hashes match those listed at the top of this document. You may also use this site to check Chew-WGA for malware.

If you have any software or settings information on the target system partition that you’d like to backup for safe-keeping, please do so before continuing.

Execute “Chew-WGA.exe” to run the tool in normal mode, or “Chew-WGA (debug).exe” to run in debug mode. Either application will produce the same results.

At the password prompt, type the following code and click OK: &8&4kVM8!DgFhjvb

It may take several minutes for Chew-WGA to conclude its tasks; please do not interrupt it. When all the processes are complete, the results will be saved to a file on your desktop. If you are running in normal mode, you will also see the results on the screen. If you are using debug mode, you will be shown a menu of options: [r] Restart the computer, [q] Quit the application, or [s] Show the results page. You must restart the computer in order to finish applying the changes.

To test your individual results, you must first reboot your computer. During reboot, change your CMOS date to several years past the expiration or grace period date, for the sake of certainty. This can also be done using the Windows system clock tool if you’re not comfortable with changing settings in the CMOS.

Look for any of the following results during normal use:

  • A notice about the expiration date being reached.
  • A watermark on the desktop that says “For testing purposes” and your Windows version or “This copy of Windows is not genuine”.
  • The theme changes to a black wallpaper automatically.
  • The system reboots itself without permission every 2 hours.
  • When running the Control Panel, WordPad, Windows Photo Viewer, Notepad, Calculator, or Paint, it brings up a dialog that reads, “To use this feature without interruption, this computer needs to be running genuine Windows.”

Chew-WGA should not be used as a means to circumvent the legitimate purchase of the Windows 7 operating system software and license. Some of the file and settings changes that this software attempts to produce are likely to result in loss of data, which may or may not be recoverable. As a result of running this software, certain built-in Windows system protection mechanisms may be modified or removed which can result in a less secure and/or an unstable user environment. Due to these system changes, particularly those concerning Windows security protections, it is advised that the target operating system is removed after testing. After using this tool, unpredictable Windows software behavior may occur.

Have Your Say
Your Name ↓
Your Email ↓
Your Website ↓
Tell us what you think of this story ↓
You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>