reg delete "HKCU\SOFTWARE\Steganos\SOS" /f reg delete "HKCU\SOFTWARE\Steganos\Products\SOS" /f rmdir "%appdata%\steganos vpn\" /s /q rmdir "%appdata%\Steganos\VPN" /s /q rmdir "%appdata%\Steganos\OnlineShield\" /s /q rmdir "%appdata%\Steganos\res" /s /q @echo off :: BatchGotAdmin :------------------------------------- REM --> Check for permissions IF "%PROCESSOR_ARCHITECTURE%" EQU "amd64" ( >nul 2>&1 "%SYSTEMROOT%\SysWOW64\cacls.exe" "%SYSTEMROOT%\SysWOW64\config\system" ) ELSE ( >nul 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system" ) REM --> If error flag set, we do not have admin. if '%errorlevel%' NEQ '0' ( echo Requesting administrative privileges... goto UACPrompt ) else ( goto gotAdmin ) :UACPrompt echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs" set params = %*:"="" echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" exit /B :gotAdmin pushd "%CD%" CD /D "%~dp0" :-------------------------------------- reg add "HKCU\SOFTWARE\Steganos\SOS" /v ReplacementProcessActive /t REG_DWORD /d 1 timeout /T 1 /nobreak "C:\Program Files (x86)\Steganos Online Shield\uninstall.exe" /S "C:\Program Files\Steganos Online Shield\uninstall.exe" /S timeout /T 1 /nobreak reg delete "HKCU\SOFTWARE\Steganos\SOS" /f reg delete "HKLM\SOFTWARE\WOW6432Node\Steganos\SOS" /f reg delete "HKLM\SOFTWARE\WOW6432Node\Steganos\Products\SOS" /f reg delete "HKLM\SOFTWARE\Steganos\SOS" /f reg delete "HKLM\SOFTWARE\Steganos\Products\SOS" /f