The Windows password is usually "hashed" and stored in the Windows SAM
file or security account manager file. The file is located on your
system at this particular file path: C:\Windows\System32\Config.
However, on normal boot up of your operating system, this file is not
accessible. The hash values are also stored in a different location,
which is your registry. This will be stored in the following location:
HKEY_ LOCAL_MACHINE\SAM.
Again, this particular location cannot be accessed when the OS is
booted up.
Source: https://www.passmoz.com/where-windows-password-stored.html
How Do I Access My Username and Password?
There are several methods and tools to accomplish this, including
physical access to the SAM file. One of the easiest ways, especially
if you have physical access to your hard drive, is to use a different
operating system to boot your computer. One way to do this is by using
a Linux live CD which can read NTFS drives. Once you mount the Windows
partition, you can simply copy the SAM file to external media such as
a USB drive or a writable DVD or CD.
Here are the list of Top 10 Free Windows 10/8/7/XP Password Recovery Tools in 2019
https://www.passmoz.com/best-windows-password-recovery-tool.html
But since you're already using Linux, go ahead and install chntpw.
https://manpages.ubuntu.com/manpages/precise/man8/chntpw.8.html
How to use it?
Simple .. here are a few examples.
chntpw SAM system
Opens registry hives SAM and system and change administrator account. This will
work even if the name has been changed or it has been localized (since different
language versions of NT use different administrator names).
chntpw -l SAM
Lists the users defined in the SAM registry file.
chntpw -u jabbathehutt SAM
Prompts for password for jabbathehutt and changes it in the SAM registry file, if
found (otherwise do nothing).