UNDERSTANDING THE CHALLENGES AND POSSIBLE MALWARE CONNECTED TO KMS PICO