The application used to control the rootkit simply needs to accept an ON or OFF command and send it to the rootkit. This is accomplished by opening the device published by the rootkit and sending it a command via DeviceIoControl.
The code is shown in the following section.