An analyst is examining a malware sample that does not list any suspicious Windows APIs in its Import Address Table (IAT). During dynamic analysis, the analyst observes the malware loading `kernel32.dll`, enumerating its exported functions, calculating a hash for each function name, and comparing it against a hardcoded list of values. This technique is primarily used for what purpose?
-
A
To check for the presence of a debugger by hashing debugger-specific function names.
-
B
To dynamically resolve API function addresses and evade static analysis detection.
-
C
To perform process injection by finding and hashing the address of `CreateRemoteThread`.
-
D
To identify and hook API calls made by other processes for espionage.