Nice post. I'm getting back into C++ myself and appreciate the sample code.
For whatever reason, Symantec only has an attack signature for Meterpreter's reverse_tcp payload: http://www.symantec.com/security_respon ... ignatures/
It's the stupidest thing in the world. Bind_tcp, reverse_https like you used, etc. work just fine.
Depending on the configuration, you are sometimes unable to disable smc in that manner (I believe this is functionality that can be disabled via the management console), so it's good to know about the alternate payloads.
Also, SEP was catching default msfvenom exes, but using the -t option with pslist.exe got around that. Sometimes it's just too easy.
The day you stop learning is the day you start becoming obsolete.