Cracking AES successfully involves known plaintext - Truecrypt uses cipher block chaining(CBC) and wraps the blocks in an encryption standard know as XTS, effectively turning the AES into a streamcipher. In your case, there are no weak points that would allow you to know the statistical characteristics of the underlying plaintext, so you would need to know the first 16 bytes to go at the AES properly.
RIPEMD-160 on the other hand almost obsolete for key hashing. This doesn't mean that reversing it is easy since a professional grade program like truecrypt probably salts the hashes - that means it appends a string onto the key while constructing the hash. Find out how the salt is plotted by google or get the Truecrypt source at sourceforge. After knowing exactly where the hash is on the file or block device, proceed extract it using a hexeditor or any other means at your disposal. Use John the Ripper to bruteforce the hash or write your own code for that (RIPEMD codec is widely available).
Coach Bags are on sale now. Coach Handbags are sold at discount price with free shipping. You may try to get the hottest Coach
Handbags at this right time. http://www.coachretailer.com/