THE PITFALLS OF USING KMS PICO: PROSPECTIVE MALWARE AND STABILITY CONSIDERATIONS