Use a reputable scanner like Windows Defender or Malwarebytes if you have already downloaded it [1, 5].
If you must inspect a file, open it in a secure, isolated virtual environment or use an online scanner like VirusTotal [2, 5].
Programs that provide remote access to a hacker [4].