Using SoThink SWF Decompiler 5.3 (Portable) i've decompiled ru.swf from
http://wwwstatic.megaupload.com/gui2/ru.swf
and after a little searching around it turns out the code were after is in Sprite538(Meaningless identifier added by SoThink) but the Sprite is also called mega.FileUploader, so looks like we're onto a winner, the variables described here (or _constantPool as its defined) are
Code: 
"_global"  "com" "Object" "mega" "FileUploader" "__server" "__eventHandler"  "__logField" "logWindow_mc" "log_txt" "init" "prototype"  "LocalConnection" "domain" "Domain[" "]" "managers" "Logger" "write"  "_this" "__file" "flash" "net" "FileReference" "addListener" "onSelect"  "__sizeTotal" "size" "name" "fileSelect" "Select[name: " ", size: "  "browse" "upload" "__id" "generateRandomID" "uploadStarted" "Date"  "getTime" "listener" "onOpen" "onUploadStart" "Up_beg[name: " ", server:  " ", pd: " "postData" "onSecurityError" "updateTransferRate"  "onUploadError" "stopNonsense" "Up_err[Security Error: " "onIOError"  "onProgress" "onVerification" "Upp_err[IO Error (Pos_file_ter)]"  "loadConfirmationXML" "onHTTPError" "Upp_err[HTTP Error]"  "__sizeProcessed" "Math" "round" "__transferRateIntervalSet"  "updateTransferRateInterval" "IntervalManager" "setInterval"  "onComplete" "timeOut" "timeOutInterval" "Up_com[name: "  "onUploadCompleteData" "removeListener" "clearInterval" "onUploadFinish"  "Up_com_data[name: " ", d: " "message="
                   "__description" "&password=" "__password" "&trafficurl="  "__trafficExchange" "&toemail=" "__recipientEmail" "&fromemail="  "__yourEmail" "&multiemail=" "__multiple" "&user=" "user"  "upload_done.php?UPLOAD_IDENTIFIER=" "&s=" "startNonsense"  "__transferRate" "cancel" "onUploadCanceled" "Up_can[name: " "XML"  "ignoreWhite" "onLoad" "firstChild" "childNodes" "attributes" "url" ""  "unescape" "onUploadTerminated" "Term_up_XML_load_succ[xml_url_att: "  "Term_up_XML_load_err" "LoadVars" "message" "password" "trafficurl"  "toemail" "fromemail" "multiemail" "POST"  "uploadquick.php?UPLOAD_IDENTIFIER=" "sendAndLoad"  "Term_up_XML_request[name: " ", id: " ",user=" "count"  "getNextHighestDepth" "nonsense_mc" "createEmptyMovieClip"  "onEnterFrame" "removeMovieClip" "0" "9" "8" "7" "6" "5" "4" "3" "2" "1"  "length" "random" "floor" "getSizeProcessed" "getTransferRate"  "getSizeRemaining" "getSizeTotal" "getName" "getDescription"  "setDescription" "getFileName" "setTrafficExchange" "setPassword"  "setRecipientEmail" "setYourEmail"
                  "setMultipleRecipients" "ASSetPropFlags"
Through out these variables it refers to startNonsense which i'm guessing might have something to do with sending the actual data of the file, if its nonsense
The main on I see here is generateRandomID which is why i'm thinking the values discussed in the previous post is random
spliff666 Reviewed by spliff666 on . MegaUpload Manager Decompile $$$ Hi, i'm looking from someone who knows more about this topic then myself as i've kind of reached my technical limit. What the objective is... Operation Hash Cookies If you upload a file with megaupload manager or via their webUI and the file is on their systems already then it (after a md5 check) instantly upload it without having to transfer the whole file. Some reading from http://poirotsramblings.blogspot.com/2008/07/megaupload-and-md5.html give a brief insight into this Rating: 5