p-Index From 2021 - 2026
6.684
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering TEKNIK INFORMATIKA Media Informatika Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Teknik Jurnal Teknologi dan Manajemen Informatika Jurnal Buana Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika AJIE (Asian Journal of Innovation and Entrepreneurship) Register: Jurnal Ilmiah Teknologi Sistem Informasi JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Network Engineering Research Operation [NERO] Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control IT JOURNAL RESEARCH AND DEVELOPMENT Seminar Nasional Teknologi Informasi Komunikasi dan Industri JRST (Jurnal Riset Sains dan Teknologi) JURNAL ILMIAH INFORMATIKA JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Indonesian Journal of Applied Informatics Jurnal Ilmiah Sinus EDUMATIC: Jurnal Pendidikan Informatika JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Infotekmesin Dinasti International Journal of Education Management and Social Science Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Cyber Security dan Forensik Digital (CSFD) JATI (Jurnal Mahasiswa Teknik Informatika) JIIP (Jurnal Ilmiah Ilmu Pendidikan) JITU : Journal Informatic Technology And Communication Automata Journal of Education Informatic Technology and Science Just TI (Jurnal Sains Terapan Teknologi Informasi) JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal Teknik Informatika (JUTIF) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Abdi Masyarakat Indonesia Indonesian Journal of Networking and Security - IJNS SPEED - Sentra Penelitian Engineering dan Edukasi Reformasi Hukum Jurnal Indonesia Sosial Teknologi Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi
Claim Missing Document
Check
Articles

Analisis Cyber Threat Injeksi Malware pada Suatu Dokumen Menggunakan Metode Mandiant’s Cyber Attack Lifecycle Model Mahmud, Rifqi; Prayudi, Yudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.438

Abstract

The number of malware attacks that occur by embedding malicious code or exploits makes it important to know the flow of the malware attack that occurs so that we can understand where the attack started and what impacts can be caused by a malware attack that occurs, and how the flow of the attack using an analytical method Cyber Attack Lifecycle. This research was conducted to find out the flow of a malware attack, to find out where the attack started and to find out what impact the attack could have on the Mandiant's Cyber Attack Lifecycle Model. Mandiant's Cyber Attack Lifecycle Model was chosen as the analysis method because it has 8 stages that can cover the entire attack flow, namely initial recon, initial compromise, establish foothold, escalate privileges, internal recon, move laterally, maintain presence, and complete mission. Analysis of the attack was carried out from a document file which was indicated to contain malware in which the document file was sent by someone using Microsoft Excel document format and would be analyzed using Mandiant's Cyber Attack Lifecycle Model method to find out where the attack started and how the attack flow could occur. The results showed that the application of the Mandiant's Cyber Attack Lifecycle Model was successful in covering all the attack paths well, knowing the impact of the attack, and being able to find out where the attack started.
Analisis Digital Artifak Aplikasi Signal Messenger Pada Sistem Operasi Android dengan metode NIST Nafila, Feryan Lutfie; prayudi, Yudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.466

Abstract

Message applications have now become a part of today's society. Beside from features, security and privacy are important things for users. Security and privacy are important because some users of this application are worried if the message their send will misused by the company. This concern is heightened after a new rule issued by a popular instant messaging application company where data from the messaging application will be linked to other applications for business purposes, some popular messenger users are worried about their privacy choosing to switch to other messaging applications that are considered more secure and offers privacy. One of the applications of choice is Signal Messenger becouse this application is more secure in maintaining privacy. This is a concern if applications that offer more privacy become a means to commit crimes. Consider that, the research work will focused on conducting forensic testing and analysis of the Android-based Signal Messenger application. The test will carried out on SMA530F and RedmiNote 4 smartphone devices. The scenario that will applied is by installing the Signal Messenger application on each smartphone, then communication between the two smartphones is such as sending text messages, images, and videos. From these activities, the mobile forensics stage using the NIST method such as making acquisitions and then analysis to obtain digital evidence. The test results will be expect for a reference for the authorities and related parties if there is a case using the Signal Messenger application and it is hoped that this research can add to the literature in the field of digital forensics, especially mobile forensics
Analisis Cyber Threat Injeksi Malware pada Suatu Dokumen Menggunakan Metode Mandiant’s Cyber Attack Lifecycle Model Mahmud, Rifqi; Prayudi, Yudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.438

Abstract

The number of malware attacks that occur by embedding malicious code or exploits makes it important to know the flow of the malware attack that occurs so that we can understand where the attack started and what impacts can be caused by a malware attack that occurs, and how the flow of the attack using an analytical method Cyber Attack Lifecycle. This research was conducted to find out the flow of a malware attack, to find out where the attack started and to find out what impact the attack could have on the Mandiant's Cyber Attack Lifecycle Model. Mandiant's Cyber Attack Lifecycle Model was chosen as the analysis method because it has 8 stages that can cover the entire attack flow, namely initial recon, initial compromise, establish foothold, escalate privileges, internal recon, move laterally, maintain presence, and complete mission. Analysis of the attack was carried out from a document file which was indicated to contain malware in which the document file was sent by someone using Microsoft Excel document format and would be analyzed using Mandiant's Cyber Attack Lifecycle Model method to find out where the attack started and how the attack flow could occur. The results showed that the application of the Mandiant's Cyber Attack Lifecycle Model was successful in covering all the attack paths well, knowing the impact of the attack, and being able to find out where the attack started.
Analisis Digital Artifak Aplikasi Signal Messenger Pada Sistem Operasi Android dengan metode NIST Nafila, Feryan Lutfie; prayudi, Yudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.466

Abstract

Message applications have now become a part of today's society. Beside from features, security and privacy are important things for users. Security and privacy are important because some users of this application are worried if the message their send will misused by the company. This concern is heightened after a new rule issued by a popular instant messaging application company where data from the messaging application will be linked to other applications for business purposes, some popular messenger users are worried about their privacy choosing to switch to other messaging applications that are considered more secure and offers privacy. One of the applications of choice is Signal Messenger becouse this application is more secure in maintaining privacy. This is a concern if applications that offer more privacy become a means to commit crimes. Consider that, the research work will focused on conducting forensic testing and analysis of the Android-based Signal Messenger application. The test will carried out on SMA530F and RedmiNote 4 smartphone devices. The scenario that will applied is by installing the Signal Messenger application on each smartphone, then communication between the two smartphones is such as sending text messages, images, and videos. From these activities, the mobile forensics stage using the NIST method such as making acquisitions and then analysis to obtain digital evidence. The test results will be expect for a reference for the authorities and related parties if there is a case using the Signal Messenger application and it is hoped that this research can add to the literature in the field of digital forensics, especially mobile forensics
IMPLEMENTASI OBJECT-RELATIONAL MAPPING (ORM) PRISMA DALAM PERANCANGAN RESTFUL API UNTUK WEB SDA DIVISION DI PT TELKOM INDONESIA TBK Ramadhan, Arya Danuarta; Prayudi, Yudi
Technologia : Jurnal Ilmiah Vol 16, No 2 (2025): Technologia (April)
Publisher : Universitas Islam Kalimantan Muhammad Arsyad Al Banjari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31602/tji.v16i2.17880

Abstract

Tujuan dari penelitian ini adalah untuk mengembangkan aplikasi manajemen proyek berbasis web yang dapat meningkatkan efektivitas dan efisiensi pengelolaan proyek di PT Telkom Indonesia Tbk. Proyek pengembangan RESTful API ini dilaksanakan dengan menggunakan metode Scrum. Program magang yang dilaksanakan di PT Telekomunikasi Indonesia Tbk ini berlangsung selama tujuh bulan, dimulai dari 17 Oktober hingga 1 Juli. Magang berlangsung selama jam kerja perusahaan, yaitu dari Senin hingga Jumat, mulai pukul 08.00 WIB hingga 17.00 WIB. Hasil penelitian menunjukkan bahwa pemagang yang mengikuti program magang di Departemen Penyelesaian, Pengiriman, dan Keamanan (SDA) Regional II PT Telkom Indonesia mengalami banyak kemajuan dan pembelajaran yang signifikan dalam hal profesionalisme dan pengembangan diri. Pemagang mengembangkan aplikasi berbasis web yang mencakup berbagai elemen dari front-end hingga back-end selama masa magang. Pemagang dapat menggunakan teknologi terkini seperti Vue.js untuk pengembangan antarmuka pengguna dan Express.js untuk back-end untuk secara aktif menerapkan teori dalam proyek nyata. Pemagang belajar mengatur waktu dengan baik, memprioritaskan tugas yang ada, dan menyelesaikan masalah selama proses pengembangan. Pemagang berkomitmen untuk memperluas pengetahuan dan keterampilan mereka dalam teknologi dan struktur industri terbaru. Keywords: Object-Relational Mapping (ORM), Restful API, PT. Telkom Indonesia Tbk, Express.jss, Metode Scrum.
INTEGRASI DIGITAL FORENSIC READINESS DAN INFORMATION SECURITY MANAGEMENT SYSTEM PADA ORGANISASI PEMERINTAHAN: SYSTEMATIC LITERATURE REVIEW Agung Firmansyah, Rico; Prayudi, Yudi; Luthfi, Ahmad
JATI (Jurnal Mahasiswa Teknik Informatika) Vol. 9 No. 2 (2025): JATI Vol. 9 No. 2
Publisher : Institut Teknologi Nasional Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/jati.v9i2.13126

Abstract

Transformasi digital di Indonesia dan berbagai negara membawa manfaat signifikan, seperti peningkatan layanan publik melalui e-government, e-payment dan layanan lainnya. Namun, transformasi ini menghadirkan tantangan dalam pengelolaan keamanan data digital dengan meningkatnya insiden seperti serangan ransomware, eksploitasi sistem, pelanggaran data, dan insiden keamanan siber lainnya. Information Security Management System (ISMS) standar dan framework yang mendukung tata kelola dan manajemen keamanan informasi, namun sering kali tidak mencakup Digital Forensic Readiness (DFR) yang menjadi framework esensial untuk menghadapi ancaman siber yaitu pengumpulan, analisis, dokumentasi bukti digital, respon terhadap insiden hingga preservasi dalam proses hukum jika dibutuhkan. Tidak diterapkannya DFR-ISMS berpotensi tidak dapat dilakukannya pengendalian dan respon pasca insiden. Mengintegrasikan DFR ke dalam ISMS menjadi solusi peningkatan efisiensi dan efektivitas pengelolaan insiden. Penelitian ini menggunakan pendekatan Systematic Literature Review (SLR) untuk mengidentifikasi tren, tantangan, dan peluang integrasi DFR dalam ISMS di e-government. Data dari 1.054 artikel Scopus difilter dan dianalisis menggunakan Protokol PRISMA, menghasilkan 64 artikel. Analisis SLR menghasilkan temuan negara terbanyak yang menganalisa topik ini dengan Metode Kuantitatif adalah Afrika Selatan, Ingris, Yunani dan China, sedangkan teori yang digunakan ISO 27043 sebagai basisnya serta FDR-ISMS sebagai frameworknya. Hasil analisa tersebut menunjukkan integrasi DFR dan ISMS sangat dibutuhkan untuk meningkatkan kesiapan keamanan siber, memperkuat akuntabilitas, serta meminimalkan risiko.
PENINGKATAN KEAMANAN DATA TERHADAP SERANGAN REMOTE ACCESS TROJAN (RAT) PADA CYBERCRIMINAL MENGGUNAKAN METODE DYNAMIC STATIC NANNY, NANNY; PRAYUDI, YUDI; RIADI, IMAM
Jurnal INSTEK (Informatika Sains dan Teknologi) Vol 4 No 2 (2019): OCTOBER
Publisher : Department of Informatics Engineering, Faculty of Science and Technology, Universitas Islam Negeri Alauddin, Makassar, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3917.959 KB) | DOI: 10.24252/instek.v4i2.9522

Abstract

Remote Access Trojan (RAT) merupakan program malware jenis Trojan Horse yang mencakup pintu belakang (backdoor) untuk kontrol administratif atas komputer target. Penelitian ini melakukan skenario penyerangan untuk mengetahui cara kerja serangan RAT, melakukan serangan RAT dan meningkatkan keamanan data dari serangan RAT melalui simulasi dan manfaat dari MikroTik. Program malware jenis trojan njRAT sebagai media simulasi antara laptop attacker (penyerang) dan laptop victim (korban). Metode yang digunakan adalah metode Dynamic Static, dimana dalam pengaturan jaringan dengan menentukan IP Address, yaitu menghubungkan 2 (dua) MikroTik Router, Router RB951Ui Versi 6 di laptop attacker dan Router RB931-2nD di laptop korban. Beberapa tools forensik yang digunakan diantaranya Wireshark, Disk Investigator, Virus Total sebagai proses analisis. Kata kunci : firewall, njRAT, Remote Access Trojan (RAT), router
Perbandingan Hasil Recovery File terhadap Penghapusan File menggunakan Perintah Sdelete dan Shift+Delete: indonesia Rosi Rahmadi Syahputra; Prayudi, Yudi
Asian Journal of Innovation and Entrepreneurship Volume 09, Issue 02, May 2025
Publisher : UII

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/ajie.vol9.iss2.art5

Abstract

The recovery of deleted data is an important aspect of forensic digital investigations, especially in identifying relevant evidence. However, deletion techniques such as the Sdelete command implement the Department of Defense (DoD) 5220.22-M standard which can permanently delete so that the process of recovering digital evidence from storage media will be difficult, while deletion using Shift+Delete only removes file references without overwriting the data, thus allowing data recovery with file carving techniques. This study uses a static forensic method, where the data in the flash drive has been deleted and acquired using FTK Imager so as to produce an imaging file to maintain the integrity of the evidence. After that, the imaging file is processed using file carving tools. This study aims to compare the results of deleted recovery using the Sdelete command and the Shift + Delete key combination and assess based on the highest percentage of the results of three file carving tools, namely Autopsy, Axiom Magnet, and Photore. The results of the study show that files deleted using Sdelete cannot be recovered by the three tools, both in terms of artifact findings and the suitability of hash values, according to Microsoft's claims. In contrast, files that have been deleted using the Shift + Delete key combination can still be recovered with varying success. PhotoRec has the highest recovery rate (90%), followed by Autopsy (88%) and Axiom Magnet (60%). In terms of hash value suitability, PhotoRec reaches 80%, while Autopsy 76% and Axiom Magnet 50%. These findings confirm that Sdelete is effective in permanently deleting data, while the Shift + Delete combination still allows for recovery with varying success rates. The author hopes that this research can be a new knowledge for digital forensic investigators in terms of selecting the most suitable file carving tools for digital evidence recovery.
Securing Electronic Medical Documents Using AES and LZMA Raharjo, Toto; Yudi Prayudi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 9 No 2 (2025): April 2025
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v9i2.6260

Abstract

With increasing threats in cyberspace, maintaining the integrity of electronic medical data is crucial. This study aims to develop a method that integrates encryption using Advanced Encryption Standard (AES) and compression with the Lempel-Ziv-Markov Algorithm (LZMA) to protect DICOM files containing sensitive information. This method is designed to address two main challenges: the growth of file sizes after the encryption process and the efficiency in data storage. In this study, an experimental design with random sampling was applied, testing 427 DICOM files from open libraries ranging in size from 513.06 KB to 513.39 KB to evaluate the implementation of this method in reducing file size, encryption time, and maintaining data integrity. The results show that this method is able to reduce file size by between 40-50% with an average encryption time of about 0.2-0.3 seconds per file. In addition, the data remains intact before and after the encryption process, which indicates that the integrity of the data is well maintained. Further analysis revealed that CPU usage during the encryption process reached 94.05%, while memory usage was recorded at 92.95 KB. In contrast, in the decryption process, CPU usage decreased to 78.16% with a much lower memory consumption, which was 31.07 KB. The findings have significant implications for medical information systems, allowing developers to easily implement these methods through APIs. This research is expected to be a reference for future studies that focus on data security in health information systems and provide new insights into the combination of encryption and compression in the context of medical data.
Analisis Kualitas Audio Steganografi MP3 Menggunakan Teknik Masking Pada Spectrogram Madi, Permadi Kusuma; Prayudi, Yudi
Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi Vol. 4 No. 2 (2025)
Publisher : Department of Informatics Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/snati.v4.i2.40248

Abstract

Steganografi menyembunyikan informasi rahasia melalui media seperti audio, video dan gambar. Penelitian ini bertujuan untuk menerapkan teknik masking pada spectrogram audio dari media MP3, serta menganalisis hasil steganografi menggunakan pendekatan pemrograman Python dengan pustaka Librosa. Permasalahan pada penelitian ini ialah bagaimana menyisipkan pesan rahasia ke dalam file audio tanpa mengganggu kualitas suara, dan pesan rahasia dapat dideteksi menggunakan teknik masking. Sehingga proses penyisipan dilakukan dengan memanfaatkan area frekuensi tertentu pada spectrogram yang cenderung tidak sensitif terhadap persepsi manusia. Sampel audio yang digunakan dalam penelitian ini terdiri dari lagu Bernadya - Hidup Harus Tetap Berjalan, nada dering Samsung Galaxy S3 dan Samsung Galaxy S20. Analisis audio dilakukan melalui visualisasi spectrogram, ekstraksi fitur Mel-Frequency Cepstral Coefficients (MFCC), Zero-Crossing Rate (ZCR), serta evaluasi metadata file audio. Tujuan dari analisis ini adalah untuk melihat apakah ada pola pola aneh atau tidak wajar yang muncul akibat penyisipan pesan rahasia dalam file audio. Jadi ketika ada data disisipkan secara tersembunyi, biasanya akan muncul perbedaan kecil dalam bentuk garis, noise, atau perubahan struktur visual yang tidak alami. Hasil penelitian menunjukkan bahwa penyisipan pesan berhasil dilakukan menggunakan teknik masking, namun menimbulkan perubahan pada karakteristik visual dan statistik sinyal audio asli dengan hasil steganografi. Sedangkan kualitas suara tidak jauh berbeda dengan audio asli.
Co-Authors - Bambang Sugiantoro, Bambang Sugiantoro - MTI UII Yogyakarta, Zaenudin - UIN Sunan Kalijaga Yogyakarta, Bambang Sugiantoro Abdul Muis Abdul Rohman Supriyono Abdul Rohman Supriyono Achmad Syauqi Adhitya Wishnu Wardhana Adi Fajaryanto Adristi, Fikri Irfan Agung Firmansyah, Rico Agus Wijayanto Agus Wijayanto, Agus Ahmad Luthfi Ahmad Luthfi Ahmad Luthfi Ahmad Luthfie Ahmad Muhariya Ahmad Ridha Kelrey Ahmad Rois Syujak Ahmad Subki - STMIK Mataram Ahmad, Muhammad Sabri Akhmad Muzakka Al Jum'ah, Muhammad Na'im Aloysius Wisnubroto Andrian Sah Ardy Wicaksono Arif Surya Putra Arrochman, Ibnu Fajar Astria Adhi Wijaya azis catur laksono Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro - Bambang Sugiantoro CITRA ARFANUDIN Danar Cahyo Prakoso Dedy Frianto Dhomas Hatta Fudholi Dimas Pamilih Epin Andrian Dinda Shafira Gita Islami Dirgahayu, Raden Teduh Dirman Dirman Dita Rahayu Berliana Dodi Prakoso Wibowo Dwi Kurnia Wibowo Efendi, Muhamad Masjun Erika Ramadhani Erika Ramadhani Ermadi Satriya Wijaya Fajaryanto, Adi Fauzan Natsir Fetyata Yudha Fietyata Yudha Firdaus, Jasmine Erina Fitriyanti S Fudholi, Dhomas Hatta Giffary, Farhan Wildan Helmi Rachman Ibnu Fajar Arrochman Idham Halik Ilman Pradhana Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Isriade Putra Ivany Hikmatunnisa' Iwan Aprizal Jidan Dj. Tamu, Zulhair Kharisma Mahesa Koes Wiyatmoko Kun Saidi Kusuma, Permadi Lilik Widyawati Madi, Permadi Kusuma Mahmud, Rifqi Mardlatillah, Hanifah Merisa Kurniasari Fadilla Moch Bagoes Pakarti Moh Fadly Panende Muh. Ditra Pamungkas Muhamad Maulana Muhammad Khairul Faridi Muhammad Naufal Bahreisy Muhammad Nur Adhar Muhammad Zulfadhilah Muzammilatul Wachidah Nafila, Feryan Lutfie NANNY, NANNY Nora Lizarti Nukman Nukman Nurhayati Jiatmiko Nurmi Hidayasari Nuryasin, Ilyas Pahrul Irfan Pomalingo, Suwito Prakoso, Danar Cahyo Putry Wahyu Setyaningsih R, Zulihsan Rachman, Helmi Raharjo, Toto Rahmat Inggi Ramadhan, Arya Danuarta Ramadhani, Erika Ramansyah Ramansyah Ridho Rahmadi Rio Pradana Aji Ririn Anggraini Rosi Rahmadi Syahputra Rosidin Al Caruban Ruuhwan Ruuhwan Setiawan, Mukhammad Andri Sisdarmanto Adinandra, Sisdarmanto Siti Kartika Munawarah Subki, Ahmad Sudinugraha, Tri Supriyono, Abdul Rohman Syarif Hidayat Teduh Dirgahayu Tino Feri Efendi Triawan Adi Cahyanto Verry Noval Kristanto Virjayanti Lazinu Wachidah, Muzammilatul Wafi, Muhammad Syafiq Wisnu Pranoto Wisnu Pranoto Wisnu Sanjaya Yasir Muin