COMPREHENDING THE CHALLENGES OF EMPLOYING KMS PICO: MALWARE AND STABILITY PROBLEMS