Which of the following is the first step you should take if malware is found on a system?