THE HAZARDS OF APPLYING KMS PICO: PROSPECTIVE MALWARE AND PROTECTION CONCERNS