THE PITFALLS OF UTILIZING KMS PICO: POTENTIAL MALWARE AND PROTECTION ISSUES