|homemars, See if the info below is applicable to your problem.|
W32/Rjump.worm lists all mapped and removable storage drives on an infected system and drops the following files onto the root folder of the available drive:
autorun.inf --> used to autorun the worm when the drive is accessed msvcr71.dll --> Clean Microsoft Visual Studio dll file ravmon.exe --> copy of the worm.
The contents of the autorun.inf are as follows:
Infection occurs when a removable storage device or a mapped drive hosting a copy of W32/Rjump.worm is accessed and the user agrees to the auto run prompt for execution of the worm.
The above info is under the Method of Infection section at the link below.
In other word those 3 files should be found using Windows Explorer in your root folder (C:) if that's the letter of the drive that Windows is installed on.