Scheduled Tasks can save credentials so that they can run under the context of a user without them having to be logged on. If we have local admin privileges on a machine, we can decrypt them in much the same way. The blobs are saved under C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\.
beacon> ls C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials
Size Type Last Modified Name
---- ---- ------------- ----
10kb fil 08/30/2022 12:42:24 DFBE70A7E5CC19A398EBF1B96859CE5D
528b fil 08/16/2022 14:55:28 F3190EBE0498B77B4A85ECBABCA19B6E
\
dpapi::cred can tell us the GUID of the master key used to encrypt each one.