Based on the exhibit, what is the BEST immediate containment action?
The workstation is still powered on, and the user reports that files are being renamed and the system is running very slowly. The security analyst confirms malicious activity is in progress.