The countcycles file contains this:
# dwFOURCC=33564d57, dFrameRate=12.000, 512x384, bInterlaceYUV411=0, bHostDeinterlace=1 Decoded on Wed Sep 07 16:43:30 2005
The IP file contains this:
Active Connections
Proto Local Address Foreign Address State
TCP 127.0.0.1:1025 127.0.0.1:2632 TIME_WAIT
TCP 127.0.0.1:1025 127.0.0.1:2634 TIME_WAIT
TCP 127.0.0.1:1025 127.0.0.1:2638 TIME_WAIT
TCP 127.0.0.1:1025 127.0.0.1:2640 TIME_WAIT
TCP 127.0.0.1:1025 127.0.0.1:2642 TIME_WAIT
TCP 127.0.0.1:2638 127.0.0.1:1025 TIME_WAIT
TCP 192.168.1.100:2611 205.209.143.43:80 TIME_WAIT
TCP 192.168.1.100:2615 216.148.223.71:80 TIME_WAIT
TCP 192.168.1.100:2619 216.148.223.71:80 TIME_WAIT
TCP 192.168.1.100:2621 205.209.143.43:80 TIME_WAIT
TCP 192.168.1.100:2631 64.233.163.104:80 TIME_WAIT
TCP 192.168.1.100:2647 64.233.167.99:80 TIME_WAIT
TCP 192.168.1.100:2653 63.240.202.121:6112 ESTABLISHED
TCP 192.168.1.100:2654 63.240.202.121:6112 TIME_WAIT
I looked into some of these and from what I can tell it looks like porn spyware and such. So I ran hijackthis, I'll attach the log: