7cf06feeea
update: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript - Add entry for .wsh files update: WScript or CScript Dropper - File - Enhance coverage with multiple file paths and extesnions update: Potentially Suspicious Powershell Script Execution From Temp Folder - Reduce level to medium and enhance metadata update: Script Interpreter Execution From Suspicious Folder - Add additional file path for coverage and enhance metadata update: Potential Dropper Script Execution Via WScript/CScript/MSHTA - Add additional file path and extension for coverage and enhance metadata --------- Co-authored-by: Swachchhanda Shrawan Poudel <87493836+swachchhanda000@users.noreply.github.com> Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
TBD