COMPREHENSION THE CHALLENGES OF WORKING WITH KMS PICO: MALWARE AND PROTECTION CONSIDERATIONS