KNOWING THE PITFALLS OF EMPLOYING KMS PICO: MALWARE AND SAFETY CONSIDERATIONS