Also because I read malware analysis and how it's all hidden and encrypted and such and I keep looking at it like "amateurish! You wrote code to create the second dll by doing a bunch of moves, but you did them all in order, making it easy to reverse engineer."