p-Index From 2020 - 2025
14.807
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security): Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Edumaspul: Jurnal Pendidikan Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi
Claim Missing Document
Check
Articles

Enterprise Architecture Planning untuk Pengelolaan Masjid Muhammadiyah Fahana, Jefree; Umar, Rusydi
Mobile and Forensics Vol 2, No 2 (2020)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v2i2.2033

Abstract

Majelis Tabligh merupakan unsur pembantu pimpinan yang ditunjuk sebagai penanggungjawab lapangan dalam pengelolaan masjid Muhammadiyah. Sampai tulisan ini hadir, data-data berkait pengelolaan masjid masih belum ada, seperti jumlah masjid se-DIY, kondisi masjid, pengelolaan jamaah, pengelolaan keuangan masjid, dan lainnya. Pengawasan terhadap masjid-masjid Muhammadiyah juga masih belum bisa dilakukan, maka perlu dukungan sistem informasi/teknologi informasi (SI/TI) yang terintegrasi. Enterprise Architecture adalah gambaran hubungan logis yang terintegrasi antara visi misi, proses bisnis, system informasi, dan infrastruktur organisasi. Enterprise Architecture Planning (EAP) merupakan suatu metode atau kerangka acuan untuk membangun suatu arsitektur informasi yang mengacu pada tujuan atau kebutuhan bisnis organisasi yaitu arsitektur bisnis, arsitektur data, arsitektur aplikasi, arsitektur teknologi. Pada penelitian ini menghasilkan suatu arsitektur bisnis yang teridentifikasi berupa area fungsi, fungsi bisnis, dan proses bisnis Majelis Tabligh. Arsitektur data berupa 10 entitas data. Arsitektur aplikasi berupa 18 aplikasi. Arsitektur Teknologi yang teridentifikasi salahsatunya menggunakan platform web dan Mobile. Selain itu, didapatkan juga portofolio aplikasi dalam bentuk Mc Farlan Grid. The Majelis Tabligh is an auxiliary element to the leadership who is appointed to be in charge of the field in the management of the Muhammadiyah mosque. Until now, there are still no data related to mosque management, such as the number of mosques in Yogyakarta, the condition of mosques, management of congregations, mosque financial management, and others. Supervision of Muhammadiyah mosques is still not possible, so it is necessary to support an information system/information technology (IS / IT) system. Enterprise Architecture is a description of the integrated logical relationship between the vision and mission, business processes, information systems, and organizational infrastructure. Enterprise Architecture Planning (EAP) is a method or frame of reference for building an information architecture that refers to the goals or business needs of the organization, namely business architecture, data architecture, application architecture, technology architecture. This research resulted in an identified business architecture in the form of function areas, business functions, and the Majelis Tabligh business process. The data architecture consists of 10 data entities. The application architecture is in the form of 18 applications. One of the identified technology architectures uses web and mobile platforms. In addition, you can also get a portfolio of applications in the form of the Mc Farlan Grid.
Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method Umar, Rusydi; Riadi, Imam; Kusuma, Ridho Surya
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2423

Abstract

Ransomware viruses have become a dangerous threat increasing rapidly in recent years. One of the variants is Conti ransomware that can spread infection and encrypt data simultaneously. Attacks become a severe threat and damage the system, namely by encrypting data on the victim's computer, spreading it to other computers on the same computer network, and demanding a ransom. The working principle of this Ransomware acts by utilizing Registry Query, which covers all forms of behavior in accessing, deleting, creating, manipulating data, and communicating with C2 (Command and Control) servers. This study analyzes the Conti virus attack through a network forensic process based on network behavior logs. The research process consists of three stages, the first stage is simulating attacks on the host computer, the second stage is carrying network forensics by using live forensics methods, and the third stage is analysing malware by using statistical and dynamic analysis. The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. It is possible to do so because the analysis is an initial step in generating virus signatures based on network indicators.
Web Forensic on Container Services Using Grr Rapid Response Framework Riadi, Imam; Umar, Rusydi; Sugandi, Andi
Scientific Journal of Informatics Vol 7, No 1 (2020): May 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i1.18299

Abstract

Cybercrime on Internet that keeps increasing does not only take place in the environment that running web applications traditionally under operating system, but also web applications that are running in more advance environment like container service. Docker is a currently popular container service in Linux operating system needs to be secured and implements incident response mechanisme that will investigate web server that was attacked by DDoS in fast, valid, and comprehesive way. This paper discusses the investigation using Grr Rapid Response framework on web server that was attacked by DDoS running in container service on Linux operating system, and the attacker using Windows oprating system that runs DDos script. This research has succesfully investigated digital evidence in the form of log file from web server running on container service and digital evidence through netstat on Windows computer.
Analysis Security of SIA Based DSS05 on COBIT 5 Using Capability Maturity Model Integration (CMMI) Handoyo, Eko; Umar, rusydi; Riadi, Imam
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.17387

Abstract

A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely. Along with the development of technology, academic information systems are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent to which the security of the academic information system of universities is conducted by evaluating. So the research was conducted to determine the Maturity Level on the governance of the security of University Ahmad Dahlan academic information system by using the COBIT 5 framework on the DSS05 domain. The DSS05 domain on COBIT 5 is a good framework to be used in implementing and evaluating related to the security of academic information systems. Whereas to find out the achievement of evaluation of academic information system security level, CMMI method is needed. The combination of the COBIT 5 framework on the DSS05 domain using the CMMI method in academic information system security is able to provide a level of achievement in the form of a Maturity Level value. The results of the COBIT 5 framework analysis of the DSS05 domain use the CMMI method to get a Maturity level of 4,458 so that it determines the achievement of the evaluation of academic information systems at the tertiary level is Managed and Measurable. This level, universities are increasingly open to technological developments. Universities have applied the quantification concept in each process, and are always monitored and controlled for performance in the security of academic information systems.
Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method Bintang, Rauhulloh Noor; Umar, Rusydi; Yudhana, Anton
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.26744

Abstract

Purpose: The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite. Facebook lite can send a text message, image, or video. Not a few Facebook users lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. Methods: In this investigation, National Institute of Standards and Technology (NIST) research methods with various stages, namely Collection, Examination, Analysis, and Reporting. Result: Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14%, while MOBILedit Forensic Express Pro data is 85.71%. Novelty: This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.
Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method Yudhana, Anton; Umar, Rusydi; Ahmadi, Ahwan
Scientific Journal of Informatics Vol 6, No 1 (2019): May 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i1.17767

Abstract

The use of cloud storage media is very popular nowadays, especially with the Google Drive cloud storage media on smartphones. The increasing number of users of google drive storage media does not rule out the possibility of being used as a medium for storing illegal data, such as places to store negative content and so on. On a smartphone with an Android operating system that has a Google Drive application installed, digital evidence can be extracted by acquiring and analyzing the system files. This study implemented a mobile forensic method based on guidelines issued by the National Institute of Standards of Technology (NIST). The results of this study are presented in the form of data recovery in the deleted Google Drive storage media, which results in the form of headers of the data type in the form of deleting account names, deleted file types, and timestamp of deleted files. Digital evidence obtained with 59 Axiom Magnet software found in the Entry227 file, with 46 files, if the percentage is a success rate of 77%.
Block-hash of blockchain framework against man-in-the-middle attacks Riadi, Imam; Umar, Rusydi; Busthomi, Iqbal; Muhammad, Arif Wirawan
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8, No 1 (2022): In progress (January)
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i1.2190

Abstract

Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer to peer, block hash, and proof-of-work to secure the payload of authentication process. The implementation uses block hash and proof-of-work methods on blockchain technology and testing is using White-box-testing and security tests distributed to system security practitioners who are competent in MITM attacks. The analyisis results before implementing Blockchain technology show that the authentication payload is still in plain text, so the data confidentiality has not minimize passive voice. After implementing Blockchain technology to the system, white-box testing using the Wireshark gives the result that the authentication payload sent has been well encrypted and safe enough. The percentage of security test results gets 95% which shows that securing the system from MITM attacks is relatively high. Although it has succeeded in securing the system from MITM attacks, it still has a vulnerability from other cyber attacks, so implementation of the Blockchain needs security improvisation.
Analisis Forensik Metarouter pada Lalu Lintas Jaringan Klien Firmansyah, Firmansyah; Fadlil, Abdul; Umar, Rusydi
Edu Komputika Journal Vol 6 No 2 (2019): Edu Komputika Journal
Publisher : Jurusan Teknik Elektro Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/edukomputika.v6i2.35221

Abstract

Seorang pengusaha atau penyedia jasa di dunia jaringan internet, tentu akan menemukan klien dengan karakter yang berbeda. Klien yang tidak buta teknologi yang khususnya router, terkadang menginginkan akses penuh ke router, atau beberapa dari klien yang meminta untuk menambahkan router untuk dapat secara langsung mengakses router secara penuh. Sebagai pengusaha layanan internet bisa saja memberikan router tambahan, namun tentu akan menambah biaya sesuai harga router. Beberapa kasus lain, misalnya sesorang klien akan membuat sebuah laboratorium jaringan komputer, maka akan sangat membutuhkan router yang banyak. Router, saat ini semakin canggih, dengan adanya metarouter, akan dapat menghemat biaya yang keluar. Metarouter memungkin klien untuk mengolah jaringan sendiri, seolah-olah klien memiliki router. Kasus yang terjadi mebuktikan bahwa router sangatlah penting untuk membagi atau mendistribusikan IP address, baik secara statik maupun dinamik. Forensik jaringan berfungsi untuk merekam kejadian atau aktifitas lalu lintas data pada jaringan komputer, dengan melakukan analisa dari hasil investigasi yang didapat, sehingga menemukan sebuah bukti aliran paket yang mencurigakan. Log aktifitas jaringan dapat menyimpan beberapa informasi yang sangat penting dalam mengungkap terjadinya ancaman atau serangan terhadap jaringan komputer. Lalu lintas jaringan dapat mengungkapkan tindakan kriminal dengan cara melihat kembali log. Aplikasi Wireshark dapat melihat paket data yang sedang berjalan secara langsung.
Analisis Statistik Manipulasi Pitch Suara Menggunakan Audio Forensik Untuk Bukti Digital Umar, Rusydi; Sunardi, Sunardi; Gustafi, Muhammad Fauzan
Mobile and Forensics Vol. 1 No. 1 (2019)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v1i1.702

Abstract

Rekaman suara adalah salah satu barang bukti digital yang bisa ditemukan dalam suatu kasus pidana maupun perdata, misalnya berupa rekaman perbincangan antara pelaku pidana. Barang bukti berupa rekaman suara atau audio sangat mudah dimanipulasi untuk menyembunyikan identitas dari rekaman suara tersebut. Pada era milenial ini sangat mudah mendapatkan alat atau perangkat lunak untuk manipulasi data terutama pada kasus ini adalah manipulasi rekaman suara. Aplikasi manipulasi rekaman suara pada dasarnya adalah merubah sinyal digital atau analog. Studi kasus pada penelitian ini adalah manipulasi rekaman suara menggunakan aplikasi Voice Changer yang ada pada smartphone Android dan dianalisis menggunakan statistik pitch. Penggunaan aplikasi Praat dapat diketahui nilai pitch maksimum, minimum, nilai tengah, rata-rata dan nilai deviasi standar sebagai parameter untuk mengetahui bahwa suara yang telah dimanipulasi tersebut identik dengan rekaman suara asli. Hasil yang didapatkan dalam penelitian dengan kasus manipulasi rekaman suara yang berisi 20 kata yang telah dimanipulasi adalah tidak identik dengan rekaman suara asli.
Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers Riadi, Imam; Umar, Rusydi; Aziz, Muhammad Abdul
Mobile and Forensics Vol. 1 No. 1 (2019)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v1i1.705

Abstract

Aplikasi instant messaging khususnya yang terdapat layanan berbasis web, sangat memungkinkan untuk dijadikan sasaran oleh para pelaku tindak kejahatan digital atau cybercrime. Vulnerabilitas dari aplikasi instant messaging berbasis web dapat dieksploitasi oleh pihak-pihak yang tidak bertanggung jawab untuk melakukan tindak kejahatan digital. Penelitian ini difokuskan pada tahapan-tahapan investigasi forensik kasus tindak kejahatan digital yang terjadi di layanan berbasis web aplikasi instant messaging WhatsApp, LINE dan Telegram. Metode yang digunakan dalam penelitian ini merujuk pada metode Association of Chief Police Officers dengan alur plan, capture, analyse dan present. Penelitian ini dalam proses investigasi forensiknya berhasil didapatkan artifact dari layanan berbasis web aplikasi instant messaging. Alat atau tools investigasi forensik yang digunakan dalam penelitian ini adalah FTK imager, NetWitness Investigator, dan Wireshark. Tingkat kerberhasilan penelitian ini mencapai 40% pada aplikasi Telegram, 60% untuk aplikasi LINE, dan aplikasi WhatsApp yang menduduki pringkat tertinggi dengan tingkat keberhasilan sebesar 85%.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Anton Yudhana Anton Yudhana Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arif Wirawan Muhammad Arizona Firdonsyah Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Fitrah Juliansyah Fitrah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Ismail Adji Nugroho Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kiagus Muhammad Rizky Aditra Utama Kusuma, Ridho Surya Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nahdli, Muhammad Fahmi Mubarok Nasrulloh, Imam Mahfudl Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Siswanto, Anwar Siti Helmiyah Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wahyudin, Widya Cholid Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Winoto, Sakti Yuminah yuminah Yuminah, Yuminah