Hi OrangeCrate,
This program is rather an oldie, because it was around in the days of the now obsolete Win 98SE, etc. I like to get an understanding of what goes around. e.g. how these processes interact. So what are the dependencies, what can be "hoovered" out of the registry, but also what goes on inside the browser scriptwise and interactively (tamper data, bugs, establishing what scripts or interaction come from the serverside of a website (leak monitor etc.).
Now I think this aspy32 is a mighty toolkit even on a tight secured restricted user computer to get to the inner workings, but changes made there can leave you with "duplicates" that are tricky to deal with, so you end up to mention a consequence with two instances of a start up program after booting, and that seems nice if you wanna rename and hijack one, but not for the average user. You should be fully aware what you are doing.
I also grew a little suspicious about the lack of documentation there and the source and the whereabouts of this program. Seems a bit like Resource Hacker but then something with quite another perspective in mind.
Overload of free time? Well I am not in that position yet, but this is a hobby of mine, so it slurps up some good deal of time, but then I think sometimes it is helpful to some, so I share my findings for the benefit of all of us here.
the old pol