Question about using hashcat for collision attack

Whenever i tried generate √N randomly(possible combinations of password length), i always find few collisons of the hash password no matter the length, if the password was made of entirely random characters of course, so i test this case on hashcat. I noticed its generate method always keep some digits intact & try all other positions possible combinations like this

caefnNHJKn854557 –> plOcmawJKn854557

This make the chance for collison to happen very low. Is there any way to set up or configure hashcat to generate an entire random combinations eachtime it try candidates?