7z salt
#1
I'm going to first mention that I'm completely new here (under a week of experience) so I'd like to apologise for anything that is either blatantly obvious or could be dug up pretty quickly.

So I'm trying to crack this 7z hash I have however Hashcat tells me it has been salted. I have also done a test with a known 7z hash (apparently it is also salted) but to no avail. I have done some digging around to see if there's any way to handle salted 7z hashes but there's nothing much about cracking these, just stuff confirming that they have indeed been salted since a certain version.

What I'm asking is this: Does Hashcat's 7z cracking remove its salt aswell and if so, how? I have not seen anything mentioning 7z cracking with salt anywhere.

Hash: $7z$0$19$0$$16$e7a4981a8c0816d8bea5659c6d630285$1216393998$16$7$8958df450e4c1ae1a4d4e20c67f502f3

Command Prompt Lines:
Device #1: Tonga, 4096MB, 985Mhz, 28MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4098/m11600.Tonga_1800.8_1800.8 (VM)_1439892092.kernel (257560 bytes)
Device #1: Kernel ./kernels/4098/amp_a0_v1.Tonga_1800.8_1800.8 (VM)_1439892092.kernel (242304 bytes)

Cache-hit dictionary stats masks/8char-1l-1u-1d-1s-compliant.hcmask: 734832 bytes, 40824 words, 40824 keyspace