COMPREHENDING THE CHALLENGES AND POTENTIAL MALWARE CONNECTED TO KMS PICO