"Step 5: if you find Any Suspicious application in the tab just look it up in google. You will get your answer is it system application or malware."
You can't just rely only on suspicious application list. Hackers can use Powershell as a payload if they have then wherever you see you won't find any suspicious application because it's the powershell which is doing all the bad deed and as powershell is a microsoft registered tool , no any antivirus is going to alarm you.
Just wanted to make this clear. If you want you can update this on your article.
And don't forget to check out my profile : @doctorbg