THE PITFALLS OF UTILIZING KMS PICO: POTENTIAL MALWARE AND PROTECTION CONSIDERATIONS