As Marco says it can't.
You can't unelevate an elevated process either.
The security improvement UAC was for was to kill programmatic elevation, as it was a huge (and thoroughly exploited) threat vector.
A nice way of doing it is rejig your process as a series of tasks. Identify those that need elevation, run up a "TaskProcessor", pass it the tasks.
Calling program then checks they've happened, if so continues.
You can do grouping, dependencies etc with this and it's nice and reusable if you put a bit of thought in.
Seems overkill for one file admittedly.
Bear in mind just requesting elevate doesn't mean it will be granted or even that the account being elevated to has the required privilege. So if you can't put that file on the root, is your application in a valid state.
Also if you are supporting pre-vista OSes, XP low rights users, terminal services etc, even UAC being off in W7, you can get some apparently illogical behaviours anyway.