NIS blocked the attempts from SVCHOST.exe to delete the files from the Virus definitions folder, because they are protected by the tamper protection feature. However, can you check in the security history to find if there are any events recorded?
One thing you may want to remember is that, a lot of malware programmers mask the malicious files with genuine system file name. Moreover, they store it in the location where the system files usually are to make it even more deceptive. For instance, taskmgr.exe. If you find this file in c:\windows\system 32, then it is genuine. However, if you find it in c:\windows, then in all probabilities it can be a malware.