It scans a given process, searching for potentially malicious implants and patches within the process space. When found, it dumps the modified/suspicious PE along with a report in JSON format, detailing about the found indicators.
https://hshrzd.files.wordpress.com/2018/09/detected1.png