An analyst is performing static analysis on a suspicious Windows executable. They observe a high-entropy section within the PE file and a very small import address table (IAT) that only lists functions like `LoadLibraryA` and `GetProcAddress`. Which of the following techniques has the malware likely employed?
-
A
Process Hollowing
-
B
Packing or Encryption
-
C
DLL Side-Loading
-
D
COM Hijacking