Just in case anyone else was curious about this rule, I ran it on a near-stock distribution of Windows 11 (with some applications installed) and these are the resulting matches:
The following rule matched the following process:
cs45_49_core 15608
I'm sure on a system with more normal use, there would be many more hits, as this is a laptop I rarely use. I would recommend seeking to tighten up the rule with additional qualifiers if you believe this is in fact a valid CS detection strategy.