If you do not want to write to the core volatility directories (which may be overwritten during upgrades/uninstalls, or may not even exist if you're using the standalone windows executable), then just place your profiles in a directory on disk and use the --plugins=/path/to/profiles option to get them loaded by volatility. Here is an example:
Task VM Start VM End Length Path
---------- ------------------ ------------------ ------------------ ----
617 0x0000000000caa000 0x0000000000e6c000 0x1c2000 dump\task.617.0xcaa000.vma
```
Dumped file has only 2MB and contains all the information that we need to recover encrypted files. To get the list of encrypted files, we can use the following command:
```bash
> volatility-2.5.standalone.exe --plugins=profiles --profile=LinuxDebian86x64 linux_enumerate_files -f d:\workspace\CTFS\Sharif16\memory.dmp
DOWNLOAD https://t.co/dGMRptkO89