The Meterpreter Payload is a specific type of multi-faceted, extensible Payload that uses DLL injection to ensure the connection to the victim host is stable and difficult to detect using simple checks and can be configured to be persistent across reboots or system changes. Furthermore, Meterpreter resides entirely in the memory of the remote host and leaves no traces on the hard drive, making it difficult to detect with conventional forensic techniques.
https://www.rapid7.com/blog/post/2015/03/25/stageless-meterpreter-payloads/
https://www.blackhillsinfosec.com/modifying-metasploit-x64-template-for-av-evasion/
When the exploit is completed, the following events occur:
stdapi and load priv if the module gives administrative rights. All of these extensions are loaded over AES encryption.hashdump
lsa_dump_sam
lsa_dump_secrets