THE PITFALLS OF MAKING USE OF KMS PICO: PROSPECTIVE MALWARE AND SECURITY CONSIDERATIONS