COMPREHENDING THE CHALLENGES AND POSSIBLE MALWARE LINKED TO KMS PICO