I don't see a way to edit so here are my commands. I can go off The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) if needed.
---------------------------------------------------
* Hash-Mode 11400 (SIP digest authentication (MD5))
---------------------------------------------------
Speed.#01........: 5116.5 MH/s (93.68ms) @ Accel:20 Loops:1024 Thr:512 Vec:1
-------------------------
* Hash-Mode 11500 (CRC32)
-------------------------
Speed.#01........: 9249.2 MH/s (54.21ms) @ Accel:42 Loops:1024 Thr:256 Vec:1
---------------------------------------------
* Hash-Mode 11600 (7-Zip) [Iterations: 16384]
---------------------------------------------
Speed.#01........: 646.9 kH/s (88.11ms) @ Accel:10 Loops:4096 Thr:512 Vec:1
--------------------------------------------------------------------
* Hash-Mode 11700 (GOST R 34.11-2012 (Streebog) 256-bit, big-endian)
--------------------------------------------------------------------
Speed.#01........: 107.6 MH/s (83.57ms) @ Accel:3 Loops:128 Thr:512 Vec:1
hashcat -m 11600 dcim.johnhash --session dcim_brute5 -O -a 3 -1 upper_lower_nums_and_not_all_symbols.hcchr -2 lower_nums_and_not_all_symbols.hcchr -3 ?l?d --increment --increment-min 5 ?3?3?3?3?3?3?3?3?3?3 -w 3 -S
└─$ hashcat -m 11600 dcim.johnhash --session dcim_2 -O -a 0 -w 3 /run/media/asdf/sam-1024-nvme/asdf/6ch.txt
hashcat (v7.1.2) starting - session [dcim_2]
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.
CUDA API (CUDA 12.4)
====================
* Device #01: NVIDIA GeForce RTX 3070, 7139/7961 MB, 46MCU
OpenCL API (OpenCL 3.0 CUDA 12.4.131) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #02: NVIDIA GeForce RTX 3070, skipped
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 20
Minimum salt length supported by kernel: 0
Maximum salt length supported by kernel: 51
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Host memory allocated for this attack: 1035 MB (27556 MB free)
Dictionary cache hit:
* Filename..: /run/media/asdf/sam-1024-nvme/asdf/6ch.txt
* Passwords.: 2751200914
* Bytes.....: 24514649144
* Keyspace..: 2751200914
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => s
Session..........: dcim_2
Status...........: Running
Hash.Mode........: 11600 (7-Zip)
Hash.Target......: $7z$1$[snip]...100000
Time.Started.....: Thu Jan 29 00:53:43 2026 (20 secs)
Time.Estimated...: Fri Jan 30 08:05:06 2026 (1 day, 7 hours)
Kernel.Feature...: Optimized Kernel (password length 0-20 bytes)
Guess.Base.......: File (/run/media/asdf/sam-1024-nvme/asdf/6ch.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#01........: 24502 H/s (74.97ms) @ Accel:10 Loops:4096 Thr:512 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 471040/2751200914 (0.02%)
Rejected.........: 0/471040 (0.00%)
Restore.Point....: 471040/2751200914 (0.02%)
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:20480-24576
Candidate.Engine.: Device Generator
Candidates.#01...: lbocl -> mdhyw
Hardware.Mon.#01.: Temp: 63c Fan: 62% Util: 88% Core:1905MHz Mem:6800MHz Bus:16
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>
---------------------------------------------------
* Hash-Mode 11400 (SIP digest authentication (MD5))
---------------------------------------------------
Speed.#01........: 5116.5 MH/s (93.68ms) @ Accel:20 Loops:1024 Thr:512 Vec:1
-------------------------
* Hash-Mode 11500 (CRC32)
-------------------------
Speed.#01........: 9249.2 MH/s (54.21ms) @ Accel:42 Loops:1024 Thr:256 Vec:1
---------------------------------------------
* Hash-Mode 11600 (7-Zip) [Iterations: 16384]
---------------------------------------------
Speed.#01........: 646.9 kH/s (88.11ms) @ Accel:10 Loops:4096 Thr:512 Vec:1
--------------------------------------------------------------------
* Hash-Mode 11700 (GOST R 34.11-2012 (Streebog) 256-bit, big-endian)
--------------------------------------------------------------------
Speed.#01........: 107.6 MH/s (83.57ms) @ Accel:3 Loops:128 Thr:512 Vec:1
hashcat -m 11600 dcim.johnhash --session dcim_brute5 -O -a 3 -1 upper_lower_nums_and_not_all_symbols.hcchr -2 lower_nums_and_not_all_symbols.hcchr -3 ?l?d --increment --increment-min 5 ?3?3?3?3?3?3?3?3?3?3 -w 3 -S
└─$ hashcat -m 11600 dcim.johnhash --session dcim_2 -O -a 0 -w 3 /run/media/asdf/sam-1024-nvme/asdf/6ch.txt
hashcat (v7.1.2) starting - session [dcim_2]
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.
CUDA API (CUDA 12.4)
====================
* Device #01: NVIDIA GeForce RTX 3070, 7139/7961 MB, 46MCU
OpenCL API (OpenCL 3.0 CUDA 12.4.131) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #02: NVIDIA GeForce RTX 3070, skipped
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 20
Minimum salt length supported by kernel: 0
Maximum salt length supported by kernel: 51
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Host memory allocated for this attack: 1035 MB (27556 MB free)
Dictionary cache hit:
* Filename..: /run/media/asdf/sam-1024-nvme/asdf/6ch.txt
* Passwords.: 2751200914
* Bytes.....: 24514649144
* Keyspace..: 2751200914
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => s
Session..........: dcim_2
Status...........: Running
Hash.Mode........: 11600 (7-Zip)
Hash.Target......: $7z$1$[snip]...100000
Time.Started.....: Thu Jan 29 00:53:43 2026 (20 secs)
Time.Estimated...: Fri Jan 30 08:05:06 2026 (1 day, 7 hours)
Kernel.Feature...: Optimized Kernel (password length 0-20 bytes)
Guess.Base.......: File (/run/media/asdf/sam-1024-nvme/asdf/6ch.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#01........: 24502 H/s (74.97ms) @ Accel:10 Loops:4096 Thr:512 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 471040/2751200914 (0.02%)
Rejected.........: 0/471040 (0.00%)
Restore.Point....: 471040/2751200914 (0.02%)
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:20480-24576
Candidate.Engine.: Device Generator
Candidates.#01...: lbocl -> mdhyw
Hardware.Mon.#01.: Temp: 63c Fan: 62% Util: 88% Core:1905MHz Mem:6800MHz Bus:16
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>
