Hi @Hram Admin
Thank you for contact Microsoft Q&A community, hope you have a nice day!
When you access a network share and are granted access without an authentication dialog, Windows is likely using cached domain credentials. These credentials might not store in Credential Manager or visible in Klist because they are not generic credentials or Kerberos tickets. Instead, Windows stores an encrypted verifier of the password in the registry's security hive, specifically for domain logons. This verifier is a salted MD4 hash computed twice, and it allows users to log on locally when the domain controller is unavailable. These cached credentials are not the actual username or password, and they do not persist in memory after the session is closed—they are stored on disk in the registry and used only for validating logons when disconnected from the domain controller.
Allow me to share related Microsoft articles bellow:
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn751047(v=ws.11)
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh994565(v=ws.11)
Please accept the answer if you believe this information adds some value, so that your experience with the issue would help contribute to the whole community.
T&R
Kate!