An analyst is examining a malware sample that does not list any suspicious Windows APIs in its Import Address Table (IAT). During dynamic analysis, the analyst observes the malware loading `kernel32.dll`, enumerating its exported functions, calculating a hash for each function name, and comparing it against a hardcoded list of values. This technique is primarily used for what purpose?