A Certified Fraud Examiner arrives to seize a computer that is currently powered on and is suspected of containing evidence of an ongoing data exfiltration scheme.
To ensure that crucial, time-sensitive evidence is not lost, which of the following actions should be performed FIRST?