THE PITFALLS OF MAKING USE OF KMS PICO: POTENTIAL MALWARE AND PROTECTION CONSIDERATIONS