I would be happy as the exploit attempt failed.
First a DCOM exploit would only work if your OS was vulnerably, e.g. way out of date (and from your time on the forums I don't think that is so). This however, doesn't stop the people trying speculative attacks in the hope that they will find a vulnerable system.
Normally your firewall should be your first line of defence in these DCOM attacks, what is your firewall ?
The attacks aren't directed at you specifically, they use random IP addresses generators like 123.123.123.123 incrementing the address by 1 each time, 123.123.123.124 and on each IP address they fire off the speculative attack on the DCOM port 135 and hope to get a hit.
Your IP address from your ISP is dynamically assigned so you shouldn't have the same one each time you connect unless you have a fixed IP address (you would have to ask for that and pay extra). So they would be very lucky to hit you constantly as your IP changes.
This is where it is coming from:
Checking IP: 78.43.81.144...
Name: HSI-KBW-078-043-081-144.hsi4.kabel-badenwuerttemberg.de
IP: 78.43.81.144
Domain: kabel-badenwuerttemberg.de
Querying root.rwhois.net:4321 for kabel-badenwuerttemberg.de...
Querying whois.denic.de for kabel-badenwuerttemberg.de...
Domain: kabel-badenwuerttemberg.de
Status: connect
Now that is a cable company in Germany, but it doesn't mean it is coming from them. They are probably an Internet Service Provider and one of their customers systems is likely to be infected and it is trying to infect other systems.
So now you should have a good understanding of why it isn't targeted directly at 'you.'