Obfuscation and compression are two potential extra hoops to jump through. It's easier to let the executable run for a bit and start from there.