3.Overpass the hash