You need to download a known good copy of that file and compare the two files. An important item to rule out is some code injection by a hacking attempt. By comparing the two files, you can find what is wrong. If there is nothing malicious, then update the file with the known good file. If you find suspect code, then you may have a larger security issue.