Insights Business| SaaS| Technology Microsoft’s Billion-Line Rust Rewrite and What It Means for the Future of Systems Software
Business
|
SaaS
|
Technology
Apr 29, 2026

Microsoft’s Billion-Line Rust Rewrite and What It Means for the Future of Systems Software

AUTHOR

James A. Wondrasek James A. Wondrasek
Comprehensive guide to Microsoft's billion-line Rust rewrite and what it means for the future of systems software

In early 2026, Galen Hunt — a Distinguished Engineer at Microsoft — posted on LinkedIn that his goal was to “eliminate every line of C and C++ from Microsoft by 2030.” At approximately one billion lines of code, that is a notable statement. The tech press ran with it. Within days, headlines were announcing that Windows was being rewritten in Rust.

That is not what is happening. But something real is.

Mark Russinovich, Azure CTO and Microsoft Technical Fellow, keynoted RustConf 2025 and confirmed that Rust code is already shipping inside Windows — specifically in DirectWriteCore and in Win32k/GDI region code, which now runs as win32kbase_rs.sys in the Windows kernel. Azure infrastructure runs Rust in Azure Boost, Caliptra, and the Virtual Machine Manager. Microsoft’s $10M investment in Rust as a “first-class language” was announced in 2022. This is not a future plan. It is a current deployment.

This article is the overview. The six articles below go deeper on each dimension of the announcement — from production evidence to AI translation timelines to enterprise migration frameworks.

| Article | What It Covers | |—|—| | Which companies are already running Rust in production | Production case studies: Google Android, AWS Firecracker, Discord, Cloudflare, Dropbox, ClickHouse, Brave | | How AI-assisted code translation actually works — and when it will be available | Microsoft CoreAI’s AI translation pipeline; feasibility and timeline | | What Rust certification means for regulated software teams | IEC 61508, IEC 62304, MISRA C replacement, CISA/NSA guidance | | How to manage Rust supply chain risk in an enterprise codebase | crates.io governance, malicious crate incident, cargo-deny, SBOM | | How to build the business case and migration plan | TCO framework, incremental migration sequencing, ROI model | | Whether Rust is a safe long-term technology bet | Rust Foundation governance, Crater, backward compatibility, Rust vs Go |

What is Microsoft’s billion-line Rust rewrite, and what did Galen Hunt actually announce?

Galen Hunt leads the “Future of Scalable Software Engineering” group inside Microsoft CoreAI’s EngHorizons research division. His LinkedIn post stated a goal of eliminating every line of C and C++ from Microsoft’s codebase by 2030, with AI agents doing the bulk of the translation work. That is approximately one billion lines of code. It is a research project ambition, stated publicly by one team within Microsoft. It is not a corporate directive and it is not a Windows migration programme.

Hunt clarified this himself after the coverage exploded: “My team’s project is a research project. We are building tech to make migration from language to language possible. The intent of my post was to find like-minded engineers…not to set a new strategy for Windows 11+ or to imply that Rust is an endpoint.”

The announcement still matters, for two reasons. First, the research project is real. Hunt’s team is building algorithmic infrastructure that creates a “scalable graph over source code at scale” and deploys AI agents guided by static analysis to make code modifications across large codebases. The stated productivity North Star is “1 engineer, 1 month, 1 million lines of code” — not yet demonstrated at scale, but a stated target that gives you a sense of the ambition. Second, it frames Microsoft’s institutional direction: Satya Nadella stated in April 2026 that 30% of Microsoft’s new code is now AI-written, which makes Hunt’s goal directionally consistent with corporate strategy even if it is not a funded migration programme.

Hunt also put the Microsoft figure in context: across the industry, he estimates 20–40 billion lines of C and C++ need to be rewritten, not just Microsoft’s billion. The announcement is as much about making the case for an industry-wide migration infrastructure as it is about Microsoft’s internal plans.

For a detailed technical analysis of how the AI translation pipeline is designed to work — and the credible objections to whether it will produce safe, idiomatic Rust — read how AI-assisted code translation actually works and when it will be available.

Is Microsoft really replacing all of its C and C++ code with Rust by 2030?

No — not in the sense most headlines implied. Windows is not scheduled for a full Rust rewrite. What is true is that Rust is already shipping in the Windows kernel, the Azure CTO is one of Rust’s most vocal institutional advocates, and Microsoft has been funding Rust adoption seriously since 2022. The 2030 goal is a research team’s ambition. The production reality is an incremental deployment programme targeting specific high-risk components.

To understand the gap between the headline and the reality, it helps to know where the announcement came from. Hunt’s team is in Microsoft CoreAI’s EngHorizons research division — they build migration infrastructure, not Windows features. The Windows kernel team is a separate organisation with separate leadership. When Hunt says “my goal,” he means the research project, not a corporate roadmap.

The institutional commitment is real but predates Hunt’s post. David Weston, Microsoft’s VP of OS Security, announced a $10M investment in Rust as a “first-class language” in 2022. Russinovich posted publicly that same year that “it’s time to halt starting any new projects in C/C++ and use Rust” for scenarios where a non-garbage-collected language is required. Microsoft also open-sourced Patina in 2025 — a UEFI boot firmware implementation written from scratch in Rust — and the Hyperlight project (Microsoft Research) adds Rust at the hypervisor layer in Azure infrastructure.

The production reality follows the same incremental pattern used by every large organisation that has adopted Rust: component by component, with Foreign Function Interface (FFI) at the boundaries between old and new code. No one — not Microsoft, not Google, not Cloudflare — has done a big-bang rewrite. What Microsoft is signalling is the direction and the institutional weight, not a near-term operational change.

What parts of Windows are already running Rust code right now?

Three specific Windows components are confirmed to be running Rust code in production. DirectWriteCore — the text rendering subsystem — was rewritten from 154,000 lines of C++ to Rust in approximately six months. Win32k/GDI region code is now shipping in Windows as win32kbase_rs.sys. Azure infrastructure includes Rust in Azure Boost, Caliptra, and the Virtual Machine Manager. These are not experiments — they are shipping code in one of the most widely deployed operating systems on the planet.

The choice to start with Win32k is deliberate and revealing. Russinovich described it as “like an underground oil repository that is leaking oil up a few drops at a time just consistently” — referring to the near-continuous stream of kernel vulnerabilities, particularly elevation of privilege issues, that have historically come out of Win32k. Writing that code in Rust is a security-first decision, not an aesthetic one.

The clearest evidence of why this matters came from a security researcher who found a bug in the new Rust version of Win32k. The result was a deterministic blue-screen crash rather than an exploitable elevation of privilege. Russinovich described this as “a success” — and he was right. In C++, that same bug would have handed an attacker kernel control. In Rust, it produced an unambiguous system crash that cannot be weaponised. That is the practical value of memory safety in a kernel context, demonstrated in production under real-world conditions.

Microsoft has also rewritten 36,000 lines of the Windows kernel in Rust in addition to the DirectWrite and Win32k work. The Hyperlight project extends Rust’s footprint further into Azure infrastructure at the hypervisor layer. The combined picture is of a systematic, multi-year programme — not a research exercise, but a methodical expansion of Rust’s footprint in the components where memory safety has the highest security payoff. For the full production case studies, read which companies are already running Rust in production.

What is memory safety, and why do security agencies say it matters?

Memory safety refers to preventing a class of bugs that occur when code manages its own memory allocation and deallocation: null-pointer dereferences, buffer overflows, use-after-free errors, and data races. These bugs are not rare edge cases — they are the most common class of exploitable vulnerability in large C and C++ codebases. Microsoft and Google have both independently measured the same figure from their own production CVE data: approximately 70% of all security vulnerabilities in large systems software trace back to memory management errors.

C and C++ require developers to manage memory manually. Rust prevents these bugs at compile time through its ownership and borrowing model. The Rust borrow checker rejects code with memory safety violations before it runs — you cannot compile a Rust programme with a data race in it, because two threads writing to the same memory without synchronisation is a compile-time error, not a runtime error. This is the property that Shivan Kaul Sahib, VP of Privacy and Security at Brave, was describing when he said that Rust makes “entire classes of security and reliability bugs impossible.”

The practical scale of this difference shows up in Google’s Android data. Memory safety bugs as a share of total Android vulnerabilities dropped from over 75% to under 20% in four years of incremental Rust adoption. The raw number fell from 223 vulnerabilities in 2019 to fewer than 50 in 2024. Vulnerability density in Rust code measures at approximately 0.2 per million lines — compared to roughly 1,000 per million in C/C++. That is a 1,000x improvement, from a single company’s production measurements, over five years.

Rust achieves this without a garbage collector. That distinction matters for performance-critical and real-time systems. Languages like Java, Go, and Python offer memory safety, but they do so by managing memory with a runtime garbage collector that introduces non-deterministic pauses. For systems software — kernel code, firmware, low-latency infrastructure — those pauses are not acceptable. Rust’s ownership model handles memory safety at compile time, with no runtime overhead and no GC pauses.

CISA and the NSA have issued joint guidance urging organisations to transition away from C and C++ toward memory-safe languages. The White House has separately pushed for memory-safe language adoption. For companies in regulated industries — HealthTech, FinTech, defence-adjacent SaaS — this regulatory momentum is increasingly shaping procurement criteria. Rust’s compiler now enforces approximately 90% of what MISRA C required external process-based enforcement to catch, which has significant implications for safety-critical Rust certification pathways. For more on what this means in practice for software subject to IEC 61508 or IEC 62304 certification requirements, read what Rust certification means for regulated software teams.

Who else besides Microsoft is rewriting systems in Rust, and what did they achieve?

The production record for Rust outside Microsoft is substantial. Google Android has 5 million lines of Rust in production, with memory safety vulnerabilities falling from 223 in 2019 to under 50 in 2024. Discord eliminated 10–50ms garbage-collection pauses by rewriting one service from Go to Rust, with a 10x performance improvement. Cloudflare cut infrastructure costs by 70% replacing NGINX with a Rust-built proxy (Pingora). Dropbox reduced CPU usage by 75% — saving over $1M annually — by rewriting its storage infrastructure. AWS Firecracker, which powers Lambda and Fargate, runs entirely in Rust and boots in 125 milliseconds.

These case studies share a common pattern worth noting. In every case, the decision to adopt Rust was driven by a specific, measurable problem — GC latency at Discord, security vulnerability accumulation at Google, infrastructure cost at Cloudflare — rather than by language ideology. In every case, outcomes exceeded expectations. And in every case, the adoption was incremental. The detailed case study breakdown for each migration shows exactly which components were migrated first and what the measurable outcomes were.

ClickHouse‘s experience at FOSDEM 2026 is the most instructive for teams considering what incremental adoption actually looks like at scale. After several years of Rust integration, 98% of the ClickHouse codebase is still C++. The team used Corrosion, a Cargo/CMake integration tool, to add specific Rust libraries — starting with BLAKE3, then PRQL, then delta-kernel-rs for Delta Lake support. “We just opened the door for Rust,” said ClickHouse CTO Alexey Milovidov. Two per cent Rust is already delivering measurable value. That is the realistic near-term picture for a large existing C++ codebase — not a billion-line rewrite, but targeted adoption delivering targeted results. Note that even this small initial footprint introduced over 700 transitive dependencies — making crates.io supply chain governance a practical concern from day one.

For the full case study analysis with specific performance and security outcome metrics for each company, read which companies are already running Rust in production.

How are AI agents being used to translate C++ to Rust at scale, and is it realistic?

Microsoft CoreAI is building AI agent infrastructure specifically to automate C++ to Rust translation at scale. The stated North Star is “1 engineer, 1 month, 1 million lines of code.” The team is hiring for engineers to “build and combine static analysis and ML tools to empower AI-assisted translation and migration tasks across the world’s largest codebases,” working with “state-of-the-art LLMs and reasoning models, large code bases, and static analysis algorithms and advanced code parsers.” The core infrastructure is described as “already operating at scale on problems such as code understanding.”

Whether the productivity target is achievable depends on a question that has not been answered yet: can AI reliably translate C++ into idiomatic, safe Rust rather than syntactically valid but architecturally unsound Rust? Credible objections exist that AI transpilation will produce “rather inefficient code using refcounts all over, or code which is ‘unsafe’ in Rust’s sense, losing the advantages of the language.” The reason is structural: Rust’s memory safety is not a layer on top of C++ logic. It requires the programmer — or the AI — to design the code from scratch around the correct memory ownership model. Auto-translated C++ is unlikely to make correct ownership decisions.

This is also why DARPA is funding a parallel programme called TRANSLATORS to apply AI tools to C-to-Rust translation at scale — an independent signal that the feasibility question is taken seriously at institutional level, not just inside Microsoft. Both programmes recognise that the hard problem is ownership modelling, not syntax translation.

The practical implication for teams right now: this tooling is months to years from being available outside Microsoft. The tools that exist today — Corrosion for CMake/Cargo integration, FFI-boundary-based incremental adoption, the ClickHouse model — do not require AI-assisted migration and deliver real value now. Tim McNamara, author of Rust in Action, noted that “AI agents are not intimidated by the Rust learning curve” and that Rust’s type hints and error messages make it unusually well-suited for AI coding assistants, which suggests that AI-accelerated Rust development (as opposed to AI-translated legacy code) is closer to current reality. Teams that understand Rust’s fundamentals now will be positioned to direct and evaluate AI-translated code quality when the tooling matures.

For the technical deep-dive on how the pipeline is designed, what the DARPA programme is doing, and a realistic timeline for external availability, read how AI-assisted code translation actually works and when it will be available.

What adoption statistics show where Rust stands in 2025 and 2026?

The JetBrains Rust Developer Ecosystem Survey 2025 found that 26% of developers use Rust in professional projects, with 53% using it daily according to the Stack Overflow 2025 survey. Thirty per cent of JetBrains survey respondents had started using Rust less than a month before the survey was conducted — a sign that the new-user pipeline is not slowing. An estimated 709,000 developers now identify Rust as their primary language, and business adoption increased 68.75% year on year. Stack Overflow has ranked Rust its “Most Admired” language continuously since Rust 1.0 shipped in 2015.

The structural indicators are moving in the same direction. The Linux kernel adopted Rust permanently in late 2025, removing the “experimental” label in the most infrastructure-critical context there is. Debian announced hard Rust requirements in APT starting May 2026, making Rust a dependency of the Linux distribution most widely deployed in production server environments — an involuntary adoption signal for systems software that targets Linux. These structural shifts are part of why the Rust governance and ecosystem maturity story has become a serious enterprise consideration, not just a language enthusiast talking point. According to the Stack Overflow 2025 survey, 45% of enterprises are now running Rust in production workloads. HFT firms and AI infrastructure companies increasingly list Rust as a required skill in engineering job postings.

The JetBrains data also shows that Rust’s user base is not primarily beginners picking a first language. Most users are experienced developers — often with C, C++, Python, or JavaScript backgrounds — making a deliberate choice. Luca Palmieri, Principal Engineering Consultant at Mainmatter and author of 100 Exercises to Learn Rust, describes the current pattern well: “Python developers reach for Rust to speed up hot paths without rewriting their entire codebase. Ruby and Elixir shops do the same via native extensions. Meanwhile, C and C++ teams use Rust to incrementally harden their systems: new modules in Rust, old ones migrated over time, the two coexisting at the FFI boundary for months or years.”

The talent market is following adoption with some lag. Developers with Rust experience are commanding a premium in infrastructure engineering roles. Teams that have not yet built any Rust capability face a widening talent gap as adoption accelerates. For analysis of the governance and stability factors — including how the Rust Foundation manages backward compatibility and how Rust compares to Go as a long-term investment — read whether Rust is a safe long-term technology bet.

What are the supply chain security risks of the crates.io ecosystem, and how do enterprise teams manage them?

In December 2025, two malicious crates — finch-rust and sha-rust — were discovered on crates.io. finch-rust attempted to mimic the existing finch crate; sha-rust performed data exfiltration across eight versions and 153 downloads. Security firm Socket detected them, notified the Rust Foundation, and both crates were removed within hours of notification on 5 December 2025. There is no confirmed evidence that either was downloaded outside automated mirroring and scanning services.

The incident matters not because it represents a failure but because it confirms that crates.io, like npm and PyPI before it, has become a target worth attacking. The Rust Foundation has a dedicated security engineer (Adam Harvey) focused specifically on crates ecosystem security and supply chain attack prevention, and the December 2025 incident was resolved faster and more transparently than comparable npm incidents.

With the security and governance picture established, the question becomes how that translates into your team’s day-to-day dependency management. crates.io downloads now bypass the application entirely and go straight to Fastly‘s CDN — the infrastructure layer is more robust than most open-source registries of comparable size. crates.io hosts over 150,000 crates, which is significantly smaller than npm (3M+ packages) and PyPI (500K+), and benefits from Rust’s strict type system reducing the class of exploitations that rely on runtime type confusion.

The governance story is reassuring for a considered assessment. The operational challenge is scope. ClickHouse’s incremental Rust integration added over 700 transitive dependencies from a small set of initial Rust libraries — the dependency graph expands rapidly. Enterprise teams need cargo-deny for policy enforcement at the package level, cargo-audit for CVE scanning, and SBOM generation as minimum governance baselines. The Cargo.lock file provides precise dependency versions for audit purposes in a way that npm does not. For the full enterprise dependency governance guide — including the supply chain risk comparison against npm and PyPI — read how to manage Rust supply chain risk in an enterprise codebase.

What does Microsoft’s Rust commitment mean for companies that are not Microsoft?

Microsoft’s institutional commitment to Rust changes the strategic calculus for every organisation that operates systems-level or performance-critical software. It validates Rust as an enterprise-grade choice, not a hobbyist experiment. It accelerates the talent market shift toward Rust skills. It places pressure on the regulatory and procurement landscape — agencies that were already pushing memory-safe languages now have the world’s largest software company as a reference deployment. The question is no longer whether Rust is ready; it is whether the cost of waiting exceeds the cost of starting.

Rust is not the right tool for every situation. Rapid prototyping under time-to-market pressure, web applications and CRUD APIs, teams without systems programming backgrounds, and short-term projects under one year are all poor candidates for a Rust adoption investment. But for performance-critical services, security-sensitive components, infrastructure software, and code in regulated domains, 2026 is a strong time to build a substantive position. The C++ to Rust migration ROI framework gives you the quantified inputs — training cost, security breach cost avoidance, talent premium — to make that case internally.

The practical decision for teams with existing C++ codebases is not whether to run a billion-line rewrite. The ClickHouse model — 98% still C++, 2% Rust delivering measurable value after several years of incremental work — is the realistic near-term outcome. The decision is whether to begin greenfield Rust adoption for new services, target specific high-CVE-risk C++ components for incremental migration, or set a 12-month evaluation programme that builds the team’s capacity for a more substantive decision.

The regulatory direction is also worth keeping in mind. CISA/NSA memory-safe language guidance and the White House push, combined with Microsoft’s public commitment, create a procurement environment in regulated industries — HealthTech, FinTech, defence-adjacent SaaS — where “we use C++ because it works” is increasingly a liability answer. For a detailed treatment of what this means in practice for regulated software teams, read what Rust certification means for regulated software teams.

The AI translation tooling trajectory matters here too. Teams that understand Rust fundamentals now will be positioned to evaluate and direct AI-translated code quality when Microsoft CoreAI or DARPA TRANSLATORS tooling becomes available more broadly. For a clear-eyed assessment of the feasibility objections and a realistic timeline for when the tooling becomes available outside Microsoft, read the AI-assisted C++ to Rust translation deep-dive. Starting now is worth more than starting later.

For a structured decision framework with a TCO model calibrated to a 50–500 person team and worked migration sequencing using the ClickHouse model, read how to build the business case and migration plan for moving legacy C++ to Rust.

Resource Hub: Microsoft Rust Rewrite — Full Coverage Library

The Evidence Base: What Is Actually Happening in Production

The Announcement: AI Translation and the Microsoft Roadmap

Risk and Compliance: What Regulated Industries Need to Know

Making the Decision: Business Case and Long-Term Confidence

FAQ Section

Is Microsoft actually rewriting Windows in Rust?

No. Windows is not being rewritten in Rust. The accurate statement is that specific Windows kernel components — DirectWriteCore (154,000 lines) and Win32k/GDI region code — are now running Rust in production as win32kbase_rs.sys. Galen Hunt’s “1 billion lines by 2030” goal is a research ambition from Microsoft’s CoreAI engineering division, not an official Windows migration programme. Mark Russinovich (Azure CTO) is the authoritative internal voice on what is actually deployed today.

What did Microsoft say about replacing C++ with Rust?

Galen Hunt posted on LinkedIn that his team’s goal is to “eliminate every line of C and C++” from Microsoft’s codebase by 2030 using AI agents to do the bulk of the translation — then clarified that this is a research project, not a Windows strategy change. Separately, Mark Russinovich posted in 2022 that “it’s time to halt starting any new projects in C/C++ and use Rust” for non-GC scenarios, and Microsoft announced a $10M investment in Rust as a “first-class language” that same year. The two narratives — research goal and production deployment — are both real but distinct.

Should a company switch to Rust in 2026?

It depends on what kind of software you build. For new performance-critical or security-sensitive services where your team has C++ expertise, 2026 is a strong time to evaluate Rust seriously. For existing large C/C++ codebases, the incremental adoption pattern — new modules in Rust, FFI at boundaries, specific high-CVE-risk components migrated first — is the approach that has worked at Google, Discord, Cloudflare, and ClickHouse. For Python, Go, or Java shops building application-layer SaaS, the urgency is lower, but evaluating Rust for hot-path performance optimisation is increasingly worth considering. For a structured framework: how to build the business case and migration plan for moving legacy C++ to Rust.

Is Rust hype or is it real?

It is real, with a caveat. The production evidence is substantial and independently verified: Google’s 1,000x vulnerability density improvement, Discord’s 10x performance gain, Cloudflare’s 70% infrastructure cost reduction, and Microsoft’s confirmed kernel deployments are documented, specific, and reproducible outcomes — not marketing claims. The hype is in the “billion-line by 2030” framing, which conflates a research project goal with a corporate programme. Rust is ready for enterprise adoption; the question is which parts of your infrastructure it is the right tool for.

How many companies use Rust in production?

According to the JetBrains Rust Developer Ecosystem Survey 2025, 26% of developers use Rust professionally, and 53% of those use it daily. Stack Overflow’s 2025 survey found 45% of enterprises are running Rust in production workloads. Named enterprise production deployments include Google (Android, Chromium), AWS (Firecracker, Lambda infrastructure), Microsoft (Windows kernel, Azure Boost), Discord, Cloudflare, Dropbox, Brave, Figma, and the Linux kernel. This is no longer a niche language.

Why does everyone keep talking about Rust replacing C++?

Because 70% of all security vulnerabilities in large software systems trace back to memory management errors in C and C++, and Rust is the only systems-level language that eliminates this class of bugs at compile time without sacrificing performance. C and C++ are estimated to represent 20–40 billion lines of code across all production systems globally — Hunt’s figure for the scope of the problem, not just Microsoft’s share. The combination of a proven technical solution and a quantified problem at enormous scale is why the industry, and regulators, are paying attention.

What is crates.io and should enterprise teams worry about it?

crates.io is Rust’s package registry — the equivalent of npm for JavaScript or PyPI for Python. It hosts over 150,000 crates. In December 2025, two malicious crates were discovered and removed within hours with no confirmed exploitation. Enterprise teams should treat crates.io with the same dependency governance rigour they would apply to any open-source registry: use cargo-deny for policy enforcement, cargo-audit for CVE scanning, and generate SBOMs as part of the CI pipeline. The governance infrastructure compares favourably with npm. Full guide: how to manage Rust supply chain risk in an enterprise codebase.

Is Rust stable enough for long-term investment?

Yes — with evidence. The Rust Foundation uses a tool called Crater that builds approximately 60% of all published crates against every proposed compiler change before it ships, an unusually rigorous backward compatibility guarantee. The Rust edition system (Rust 2015, 2018, 2021, 2024) allows syntax evolution without breaking existing code — the same guarantee that made Go attractive to enterprises. Linux kernel permanent adoption in late 2025, the Ferrocene Language Specification for safety-critical certification, and Microsoft’s institutional investment all reinforce long-term viability. Full analysis: whether Rust is a safe long-term technology bet.

AUTHOR

James A. Wondrasek James A. Wondrasek

SHARE ARTICLE

Share
Copy Link

Related Articles

Need a reliable team to help achieve your software goals?

Drop us a line! We'd love to discuss your project.

Offices Dots
Offices

BUSINESS HOURS

Monday - Friday
9 AM - 9 PM (Sydney Time)
9 AM - 5 PM (Yogyakarta Time)

Monday - Friday
9 AM - 9 PM (Sydney Time)
9 AM - 5 PM (Yogyakarta Time)

Sydney

SYDNEY

55 Pyrmont Bridge Road
Pyrmont, NSW, 2009
Australia

55 Pyrmont Bridge Road, Pyrmont, NSW, 2009, Australia

+61 2-8123-0997

Yogyakarta

YOGYAKARTA

Unit A & B
Jl. Prof. Herman Yohanes No.1125, Terban, Gondokusuman, Yogyakarta,
Daerah Istimewa Yogyakarta 55223
Indonesia

Unit A & B Jl. Prof. Herman Yohanes No.1125, Yogyakarta, Daerah Istimewa Yogyakarta 55223, Indonesia

+62 274-4539660
Bandung

BANDUNG

JL. Banda No. 30
Bandung 40115
Indonesia

JL. Banda No. 30, Bandung 40115, Indonesia

+62 858-6514-9577

Subscribe to our newsletter