COMPREHENSION THE THREATS OF APPLYING KMS PICO: MALWARE AND SECURITY PROBLEMS