Event ID - 10038

Event Id10038
SourceWinSock
DescriptionAn operation was attempted on something that is not a socket.
Event InformationCause:

This issue may occur if you have a third-party product installed that uses Windows sockets and also uses the ipconfig, release, and renew commands. The Windows sockets registry subkeys may be corrupted.

Resolution :

Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall your operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.To resolve this problem, use either of the following methods

Method 1

We recommend that you use Method 1 if either of the following conditions are true:

• You only have one computer.
• You do not have access to a computer that is similar to the first computer where you experienced the symptoms that are described in the "Symptoms" section. A computer that is similar to the first computer is another computer that has the same operating system version and a similar hardware configuration.

Use Registry Editor to export and delete the Winsock and Winsock2 registry subkeys, and then remove and reinstall TCP/IP on Microsoft Windows 2000 or Microsoft Windows XP. To do this, follow these steps.

Export and delete the corrupted registry subkeys

1. Insert a floppy disk in the floppy disk drive of the computer whose registry entries you are exporting.
2. Click Start, click Run, type regedit, and then click OK.
3. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Winsock
4. On the File menu, click Export.
5. In the Save in box, click 3½ Floppy (A:), type a name for the file in the File name box, and then click Save.
6. Right-click Winsock, and then click Delete. When you are prompted to confirm the deletion, click Yes.
7. Repeat steps 3 through
Reference Links

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.