A malware analyst is performing static analysis on a Windows executable and observes that the Import Address Table (IAT) is unusually small, containing only a few essential functions like `LoadLibraryA` and `GetProcAddress`. However, dynamic analysis reveals the malware makes numerous suspicious API calls related to network communication and file system manipulation. Which of the following obfuscation techniques is MOST likely being used?