Passwords – Is PSexec still possible from Windows 10?

So, while playing with Responder on my private network, I managed to find the NTLMv2 hash of my host machine and even managed to decrypt it using custom rules and instructions. hashcat. However, I can not seem to use these acquired credentials to get any access to my machine. I have tried wmiexec since impacket, MSF PSexec and CME until now, and although CME connects to the machine (unlike the others), it does not execute any scripts entered initially as parameter.

Does this mean that Windows 10 is totally safe from attackers, even when some creantinals are known?