Do as DavidR suggests, we do not want malcreants to abuse this in some way or other.
It is a legit Windows script, and as potentially malicious Avast should detect this as Win32:Vitro.
Typically, the wscript.exe executable can be located in "C:\Windows\System32",
a Windows folder that contains operating system files.
However, if the wscript.exe filename is used to disguise malware,
this particular file is placed in another folder and/or will have a different name (for example, wcript.exe).
Typically, cyber criminals give names very similar to legitimate files to avoid suspicion.
Moreover when a malicious process is running in Task Manager, it should contain a graphic icon beside it,
when actually it should have a system icon.
One should note that virus detection engines sometimes detect legitimate files as threats
(this could provide so-called 'false positive' results - FP's).
Submittal to avast as Asyn suggests in his posting may prevent this in the future for the "unaware".
All the more reason to be very suspicious with such Wscript shell virus examples.
polonus