Identifying file manipulation in system files

Sometimes people send files to us that seem to be legitimate Microsoft system files at first glance, yet closer inspection reveals, that they have in fact been modified. Are those manipulations always malicious? And how can file manipulations be identified? Here are seven different ways to do that.

     

Article Link: Identifying system file manipulations: Not always and open and shut case