SlideShare a Scribd company logo
@echo off
cls
:start
echo ============================================
echo 1. Notepad
echo 2. Calculator
echo 3. Snipping Tool
echo 4. Command Prompt
echo 5. Process Hacker
echo 6. On-Screen Keyboard
echo 7. Bank Mandiri
echo.
echo 8. Internet Explorer
echo 9. Mozilla Firefox
echo 10. Microsoft Outlook
echo 11. Internet Download Manager
echo.
echo 12. Daily Report
echo.
echo 13. Keluar
echo.
set /p pilihan=pilih yang akan dibuka:
IF '%pilihan%' == '%pilihan%' GOTO Item_%pilihan%
:Item_1
start /MIN /DC:WindowsSystem32 notepad.exe
GOTO Start
:Item_2
start /MIN /DC:WindowsSystem32 calc.exe
GOTO Start
:Item_3
start /MIN /DC:WindowsSystem32 SnippingTool.exe
GOTO Start
:Item_4
start /MIN /DC:WindowsSystem32 cmd.exe
GOTO Start
:Item_5
start /MIN /D"C:UsersUserDesktop" ProcessHacker.exe
GOTO Start
:Item_6
start /MIN /DC:WindowsSystem32 osk.exe
GOTO Start
:Item_7
start /MIN /D"C:Program Files (x86)Mozilla Firefoxfirefox.exe"
http://www.bankmandiri.co.id
GOTO Start
:Item_8
start /MIN /D"C:Program Files (x86)Internet Explorer" iexplore.exe
GOTO Start
:Item_9
start /MIN /D"C:Program Files (x86)Mozilla Firefox" firefox.exe
GOTO Start
:Item_10
start /MIN /D"C:Program Files (x86)Microsoft OfficeOffice14" OUTLOOK.EXE
GOTO Start
:Item_11
start /MIN /D"C:Program Files (x86)Internet Download Manager" IDMan.exe
GOTO Start
:Item_12
D:
cd Documents
"Daily Report Mei (Maulana Kurniantoro).xlsx"
GOTO Start
:Item_13
exit

More Related Content

What's hot

Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
jesicasruma
 
How To Prevent Virus Part1
How To Prevent Virus Part1How To Prevent Virus Part1
How To Prevent Virus Part1
Politeknik Transkrian
 
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.comStep By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
andreswright576
 
How To Remove Browser Hijacker
How To Remove Browser HijackerHow To Remove Browser Hijacker
How To Remove Browser Hijacker
Sean Doyal
 
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manuallyHow to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
haroNaroum
 
Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10
scarlet christer
 
Example esb flow
Example esb flowExample esb flow
Example esb flow
Antonio Pellegrino
 

What's hot (7)

Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
 
How To Prevent Virus Part1
How To Prevent Virus Part1How To Prevent Virus Part1
How To Prevent Virus Part1
 
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.comStep By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
 
How To Remove Browser Hijacker
How To Remove Browser HijackerHow To Remove Browser Hijacker
How To Remove Browser Hijacker
 
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manuallyHow to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
 
Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10
 
Example esb flow
Example esb flowExample esb flow
Example esb flow
 

Similar to contoh Shortcut dot batch

Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
Dan Morrill
 
Cooking with Chef
Cooking with ChefCooking with Chef
Cooking with Chef
Orlando_Ruby_Users_Group
 
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangMcAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_Hang
Eric Roberson
 
It Works On Dev
It Works On DevIt Works On Dev
It Works On Dev
marcelesser
 
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan   set up in windows 8Windows defender scheduled scan   set up in windows 8
Windows defender scheduled scan set up in windows 8
Trường Tiền
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
ajay_mane22
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Celia Bandelier
 
Rooted 2010 ppp
Rooted 2010 pppRooted 2010 ppp
Rooted 2010 ppp
noc_313
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Johndion Ruloma
 
Fun with Ruby and Cocoa
Fun with Ruby and CocoaFun with Ruby and Cocoa
Fun with Ruby and Cocoa
Patrick Huesler
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
Sudhanshu Mishra
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
IOSR Journals
 
Monit - NHRuby May 2009
Monit - NHRuby May 2009Monit - NHRuby May 2009
Monit - NHRuby May 2009
bturnbull
 
Troubleshooting Plone
Troubleshooting PloneTroubleshooting Plone
Troubleshooting Plone
Ricado Alves
 
Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8
Wilson Su
 
It troubleshooting - Arthur B
It troubleshooting - Arthur BIt troubleshooting - Arthur B
It troubleshooting - Arthur B
asberg1997
 
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post ExploitPenetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
JongWon Kim
 
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password   apps for windowsHow to remove password if you forgot windows 7 password   apps for windows
How to remove password if you forgot windows 7 password apps for windows
Raj Kamal Choudhary
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
pacampbell
 
JNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdfJNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdf
tejaswiniprathapanen
 

Similar to contoh Shortcut dot batch (20)

Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
Cooking with Chef
Cooking with ChefCooking with Chef
Cooking with Chef
 
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangMcAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_Hang
 
It Works On Dev
It Works On DevIt Works On Dev
It Works On Dev
 
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan   set up in windows 8Windows defender scheduled scan   set up in windows 8
Windows defender scheduled scan set up in windows 8
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Rooted 2010 ppp
Rooted 2010 pppRooted 2010 ppp
Rooted 2010 ppp
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Fun with Ruby and Cocoa
Fun with Ruby and CocoaFun with Ruby and Cocoa
Fun with Ruby and Cocoa
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Monit - NHRuby May 2009
Monit - NHRuby May 2009Monit - NHRuby May 2009
Monit - NHRuby May 2009
 
Troubleshooting Plone
Troubleshooting PloneTroubleshooting Plone
Troubleshooting Plone
 
Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8
 
It troubleshooting - Arthur B
It troubleshooting - Arthur BIt troubleshooting - Arthur B
It troubleshooting - Arthur B
 
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post ExploitPenetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
 
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password   apps for windowsHow to remove password if you forgot windows 7 password   apps for windows
How to remove password if you forgot windows 7 password apps for windows
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
 
JNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdfJNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdf
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

contoh Shortcut dot batch

  • 1. @echo off cls :start echo ============================================ echo 1. Notepad echo 2. Calculator echo 3. Snipping Tool echo 4. Command Prompt echo 5. Process Hacker echo 6. On-Screen Keyboard echo 7. Bank Mandiri echo. echo 8. Internet Explorer echo 9. Mozilla Firefox echo 10. Microsoft Outlook echo 11. Internet Download Manager echo. echo 12. Daily Report echo. echo 13. Keluar echo. set /p pilihan=pilih yang akan dibuka: IF '%pilihan%' == '%pilihan%' GOTO Item_%pilihan% :Item_1 start /MIN /DC:WindowsSystem32 notepad.exe GOTO Start :Item_2 start /MIN /DC:WindowsSystem32 calc.exe GOTO Start :Item_3 start /MIN /DC:WindowsSystem32 SnippingTool.exe GOTO Start :Item_4 start /MIN /DC:WindowsSystem32 cmd.exe GOTO Start :Item_5 start /MIN /D"C:UsersUserDesktop" ProcessHacker.exe GOTO Start :Item_6 start /MIN /DC:WindowsSystem32 osk.exe GOTO Start :Item_7 start /MIN /D"C:Program Files (x86)Mozilla Firefoxfirefox.exe" http://www.bankmandiri.co.id GOTO Start :Item_8 start /MIN /D"C:Program Files (x86)Internet Explorer" iexplore.exe GOTO Start :Item_9 start /MIN /D"C:Program Files (x86)Mozilla Firefox" firefox.exe GOTO Start :Item_10 start /MIN /D"C:Program Files (x86)Microsoft OfficeOffice14" OUTLOOK.EXE
  • 2. GOTO Start :Item_11 start /MIN /D"C:Program Files (x86)Internet Download Manager" IDMan.exe GOTO Start :Item_12 D: cd Documents "Daily Report Mei (Maulana Kurniantoro).xlsx" GOTO Start :Item_13 exit