UNDERSTANDING THE HAZARDS OF EMPLOYING KMS PICO: MALWARE AND SECURITY CONSIDERATIONS