Stack-Based Buffer Overflows on Windows x86 Remote Exploitation

Hi,

I am doing the Stack-Based Buffer Overflows on Windows x86 module and section Remote Exploitation.

The remote CloudMe server is starting the reverse shell and I am seeing an incoming connection, but soon after the connection is dropped. I have looked my python script and the python script that the Module gives you and they are doing the same thing (ofcourse there is a difference in the msfvenom payload).
Why is the connection getting dropped? Am I doing something wrong?

Oke for some reason the same payload worked on the 3rd reset of the machineā€¦