THE CHALLENGES OF APPLYING KMS PICO: POSSIBLE MALWARE AND SAFETY CONSIDERATIONS