Hi Robert,
Have you tried using filescan to find the files on the TC volume? In
the original experiment did you leave the TC volume open?
The handles plugin enumerates handles for processes that are found in
the process list by default. It's possible that earlier, the process
that had that handle open to Test.txt was still running and in later
experiments you killed that process, causing it to disappear from the
process list and therefore its handles were not output.
Try filescan to pick up these files and see if you still see them. If
your end goal is to extract them from memory, you can use the dumpfiles
plugin and supply the physical offset of the _FILE_OBJECT (obtained from
filescan) like so:
vol.exe -f memdump.mem --profile=Win7SP1x64 -Q OFFSET -D OUTPUTDIR
All the best,
-Jamie
> _______________________________________________
On 4/27/14 11:02 AM, Robert Merriott wrote:
> Hello
>
> I've been testing volatility and looking through the results. In
> particular, within the Handles extraction, I found the following line...
>
> 0xfffffa8009648800 3544 0x1a78 0x120089 File
> \Device\TrueCryptVolumeK\Test.txt
>
> This is a file that I had stored in a hidden volume. I attempted to
> re-create this type of entry with 3 further memory dumps with no such
> success (No files within TrueCrypt volume). Can anyone advise why this
> filename "Test.txt" was found? I see that a lot of files can be found
> in the Handles extraction, but haven't been able to find any
> documentation on how files are included in this section.
>
> I ran the following command on an 8GB Memory dump which was captured
> via FTK Imager...
>
> vol.exe -f memdump.mem --profile=Win7SP1x64 --output=text
> --output-file=handles-files.txt handles -t File
>
> This result was a total surprise to find. In further testing, I
> attempted to do the following within the hidden volume...
> - Create new files
> - Copy files into the volume
> - Leave files open while closing the volume within TrueCrypt
>
> Thanks,
>
> R
>
>
> Vol-users mailing list
> Vol-users@volatilesystems.com
> http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
--
Jamie Levy (@gleeda)
Blog: http://volatility-labs.blogspot.com/
GPG: http://pgp.mit.edu/pks/lookup?op=get&search=0x196B2AB527A4AC92
Fingerprint: 2E87 17A1 EC10 1E3E 11D3 64C2 196B 2AB5 27A4 AC92