LSASS, SAM, and Windows Credentials are all typically heavily monitored by EDR. If you aren't trying to set off alarms, it may be worth it to explore some alternative sources of credentials for lateral movement or privilege escalation.
Command History
PowerShell command history is an awesome source of cleartext credentials or connection strings.
gc (Get-PSReadLineOption).HistorySavePath
Here is a one-liner to list every user's PowerShell history.
foreach($user in ((ls C:\users).fullname)){cat "$user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt" -ErrorAction SilentlyContinue}
Files
I typically start by simply looking at what the user directories have to offer. Most of the time all user directories will be empty except for one or two. After that you can quickly narrow things down with a few commands.