64 bit service loaded from Program Files (x86), 32 bit or 64 bit?

Posted on 2014-04-24
Last Modified: 2014-04-24
I have a service running on a 2003 64 bit server that loads from the Program Files (x86) folder. This folder is where 32 bit programs are usually loaded. In task manager the service shows up as XXXXXservice.exe with out the *32 following.

Is it running 32 or 64 bit and if it is running 32 bit if I uninstall and reinstall in Program Files will it run as 64 bit?
Question by:jimmylew52
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 31

Expert Comment

ID: 40020148
Hi jimmylew52,

if the EXE isn't marked as *32 it sure is a 64-bit process. It makes no difference in which folder the file is located on the harddisk, generally it's of course possible to put 32 bit programs in 'C:\Program Files\ and 64 bit programs in 'C:\Program Files (x86)'.


Author Comment

ID: 40020240
Any idea why when I run

C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319>aspnet_regiis -i -enable

I get this?

The error indicates that IIS is in 64 bit mode, while this application is a 32 b
it application and thus not compatible.

As best I can tell IIS is running in 64 bit mode and the application files will support both 32 and 64 bit modes.
LVL 31

Accepted Solution

Zoppo earned 500 total points
ID: 40020252
I guess you use the wrong aspnet_regiis which is 32 bit in C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319 - try to start the same from C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319

Hope this helps,


Author Comment

ID: 40020319
That would be the problem. Thank you
LVL 31

Expert Comment

ID: 40020333
You're welcome - I'm glad I could help ...

Have a nice day,

best regards,


Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is meant to give a basic understanding of how to use R Sweave as a way to merge LaTeX and R code seamlessly into one presentable document.
Q&A with Course Creator, Mark Lassoff, on the importance of HTML5 in the career of a modern-day developer.
The viewer will be introduced to the member functions push_back and pop_back of the vector class. The video will teach the difference between the two as well as how to use each one along with its functionality.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question