If we compromise a domain or local user account which has the seDebugPrivilege enabled, we may be able to generate a memory dump of certain protected and sensitive processes such as LSASS
With the required PID, we can run the command below to spawn a new child process of the latter, which will be executed as LOCAL SYSTEM
Remember that seDebugPrivilege allows an arbitrary process, such as cmd.exe, to debug any non-protected process, being able to read and write to the memory space of the latter