Any command that runs from Post-Setup, whether (Before logon) or (After logon) has elevated rights. (After logon) commands run as your user account, but with Admin privileges. You don't need to include another wrapper, unless you're trying to run PowerRun or another tool as TrustedInstaller.
Normally if you add .reg files to Post-Setup, NTLite will run "reg import" for you. HKCU changes should be applied from (After logon), because the Current User will be the same as the primary user logged on.
Do you have specific examples of what reg file changes you want to apply?
Yes I'm working on these keys
;30 Disable Windows spying
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection]
"AllowTelemetry"=dword:00000000
; Disable the AutoLogger-Diagtrack-Listener key
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener]
"Start"=dword:00000004
; Delete the SQMLogger key
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\SQMLogger]
"Start"=dword:00000004
; Add these entries to your hosts file to block RedShell and TreasureData
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DataBasePath]
@=hex(2):25,00,57,00,69,00,6e,00,44,00,69,00,72,00,25,00,5c,00,53,00,79,00 ,73,00,74,\
00,65,00,6d,00,33,00,32,00,5c,00,64,00,72,00,69,00,76,00,65,00,72,00,73,00, 5c,\
00,65,00,74,00,63,00,00,00
; Disable the DiagTrack and dmwappushservice services
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiagTrack]
"Start"=dword:00000004
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dmwappushservice]
"Start"=dword:00000004
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsSelfHost\UI\Visibility]
"DiagnosticErrorText"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsSelfHost\UI\Strings]
"DiagnosticErrorText"=""
"DiagnosticLinkText"=""
; Additional telemetry block
[-HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection]
; Disabling Windows Defender AntiSpyware
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender]
"DisableAntiSpyware"=dword:00000001
For this reason I created the exe file with PowerRun.exe inside and a batch to ensure that it is used when the exe is started to elevate the authorization