COMPREHENDING THE HAZARDS OF APPLYING KMS PICO: MALWARE AND STABILITY CONSIDERATIONS