

If you are worried about virus, you can double check both VBS and powershell file created. Here the code:
ExternalCurlHandler.vbs (used to call powershell in hidden mode. C:\Users\MrObama2022\AppData\Local\Temp\ is my temporary dir)
Code: Select all
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "powershell.exe -NoProfile -ExecutionPolicy Bypass -File ""C:\Users\MrObama2022\AppData\Local\Temp\ExternalCurlHandler.ps1""", 0
Code: Select all
& curl.exe -L --output 'C:\Users\MrObama2022\AppData\Local\Temp\curlOutput.html.tmp' --url 'https://www.filmaffinity.com/es/advsearch.php?page=1&stext=Top%20Gun:%20Maverick&stype[]=title' -H 'Accept: text/html, */*' -H 'Accept-Language: it' -H 'DNT: 1' -H 'Priority: u=0, i' -H 'Sec-Ch-Ua: "Not)A;Brand";v="8", "Chromium";v="138", "Google Chrome";v="138"' -H 'Sec-Ch-Ua-Mobile: ?0' -H 'Sec-Ch-Ua-Platform: "Windows"' -H 'Sec-Fetch-Dest: Document' -H 'Sec-Fetch-Mode: Navigate' -H 'Sec-Fetch-Site: None' -H 'Sec-Fetch-User: ?1' -H 'Upgrade-Insecure-Requests: 1' -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36' 2>$null
Rename-Item -Path "C:\Users\MrObama2022\AppData\Local\Temp\curlOutput.html.tmp" -NewName "C:\Users\MrObama2022\AppData\Local\Temp\curlOutput.html"