passwords – Is PSexec possible from Windows 10?

While playing with the Responder on my network, I could find the NTLMv2 hash on my host machine, and I could even decipher it with the help of some custom rule sets and hashcat. However, it seems that I can not use the acquired credentials to obtain any type of access to my machine. I have tried wmiexec since impacket, MSF PSexec and CME so far, and although CME seems to have logged on to the machine, it did not execute any of the scripts that I initially entered as a parameter.

Does that mean that Windows 10 is completely safe from attackers, even when some credentials are known?