An analyst is performing static analysis on a suspicious Windows executable. They observe a high-entropy section within the PE file and a very small import address table (IAT) that only lists functions like `LoadLibraryA` and `GetProcAddress`. Which of the following techniques has the malware likely employed?