COMPREHENDING THE PITFALLS OF USING KMS PICO: MALWARE AND PROTECTION CONSIDERATIONS