UNDERSTANDING THE CHALLENGES AND PROSPECTIVE MALWARE CONNECTED TO KMS PICO