| Index: chrome/browser/install_verification/win/imported_module_verification.cc
 | 
| diff --git a/chrome/browser/install_verification/win/imported_module_verification.cc b/chrome/browser/install_verification/win/imported_module_verification.cc
 | 
| index 86728652ddbe81b5541d33ef0a8aed6bb389c686..3d5abb68375e1751e65cd8dd2b4ced4107f9534c 100644
 | 
| --- a/chrome/browser/install_verification/win/imported_module_verification.cc
 | 
| +++ b/chrome/browser/install_verification/win/imported_module_verification.cc
 | 
| @@ -16,6 +16,7 @@
 | 
|  
 | 
|  namespace {
 | 
|  
 | 
| +#if !defined(_WIN64)
 | 
|  // We must make sure not to include modules here that are likely to get unloaded
 | 
|  // because the scanning of the module is not done within a loader lock, so is
 | 
|  // not resilient to changes made to the modules list.
 | 
| @@ -24,6 +25,7 @@ const wchar_t* const kModulesToScan[] = {
 | 
|    L"kernel32.dll",
 | 
|    L"user32.dll"
 | 
|  };
 | 
| +#endif  // !defined(_WIN64)
 | 
|  
 | 
|  bool AddressBeyondRange(const ModuleInfo& module, uintptr_t address) {
 | 
|    return module.base_address + module.size < address;
 | 
| 
 |