COMPREHENDING THE THREATS AND POSSIBLE MALWARE CONNECTED WITH KMS PICO