Disassembler. VISDA uses Bea-engine for disassembly. The latter is done in a fully  recursively manner, following the (static) code-flow for each possible path.  Code-Analyzer.  VISDA analyses the disassembled code in various ways to find any piece of  information that could be of interest to the analyst.  This further includes the following specifics: Identification of scopes (functions, procedures). Correlation and renaming of calls to functions imported by IAT.  Identification of literals (Ascii, Unicode, UTF8).  Fingerprintmatching for inlined functions f.e. of WinAPI32, C-libraries, ...  and therefore better identification of “real” user-code.  Identification and correlation of pushed function arguments and  eventually used constants.  Additional pseudo-code generation for typical compiler-constructs. Deepdigging for each CALL for sub-levelled API-calls and custom  search-criteria. Identification of jumps/calls into an instruction. Identification of loops (even for multileveled).  Graphical Navigation.  In VISDA navigation is done through the entirely visualized assembly-code,  similar to IDA Pro, but just not the same. Instead of letting things horizontally  grow - as IDA Pro does - VISDA respects the vertical character of assembly-  code with a strong focus on code-blocks, jumps and loops. Investigation and fast and easy “eye-matching” of code-aspects is done by  dynamically reactions on clicks of the user in the code.  Context-Sensitive Popupmenues. One of VISDAs strengths lies in its massively context-sensitive popupmenues.  Notes, Comments, Labels.  VISDA provides the analyst with multiple possibilities for documentation.  Detailed Activity Logs.  It’s absolutely important for analysts to keep track of their investigations and  activities. Therefore even each oh so minor activity is stored with timestamp  information in the project-log.  Cases. As a typical malware-analysis case usually spreads over multiple files and  actions VISDA will let you keep track of all case-components by storing all in  one huge case-file. Blacksense. VISDA introduces a new concept (Blacksense) of dealing with specific code-  aspects which are intended to be hurdles to reverse-engineers. This is done  by actively spotting them in the code also giving further hints.  Easy reports, analysis and queries through SQL.  As VISDA is entirely based on a relational database (SQLite) it’s absolutely  easy to do reports and queries.