UNDERSTANDING THE THREATS AND POTENTIAL MALWARE CONNECTED WITH KMS PICO