To find out if your windows machine is vulnerable to Apache’s log4j related vulnerabilities, run this command by firing up the Windows PowerShell as an Administrator.
Get-childitem -Path c:\ -Include log4j*.jar -File -Recurse -ErrorAction SilentlyContinue | select Lastwritetime, directory, name | export-csv -append -notypeinformation c.csv
After the scan is complete, it will generate c.csv file at the location where you ran the command.
Replace c:\ with the drives letters you got.
Check the CSV file to see if there are any listings.
If there are, then do the needful, by either updating your software or installing patches or uninstalling the software as you see fit.