KNOWING THE CHALLENGES AND POTENTIAL MALWARE CONNECTED WITH KMS PICO