I've read that three times, still don't follow what you're getting at. That isn't how length extension attacks work/can be utilised.
Please go ahead and generate a file that collides with any of the linked files and is the same file size. The content doesn't have to be valid or readable, junk/binary is fine. If you can do this in a reasonable period of time (e.g. 24 hrs) then your point would have been proven.
The smallest is 224K with a hash of 180caf23dd71383921e368128fb6db52.