What are the first steps to take to determine the source of malicious activity in Windows?

   

v20240901