COMPREHENSION THE THREATS AND POTENTIAL MALWARE CONNECTED WITH KMS PICO