I reseted firewall rules and don’t see anything related to sdk on both machines.
Here is veryverbose LogHttp from pc that doesn’t work
LogHttp: Verbose: 0000021007C46B00: URL='https://api.wit.ai/message?v=20230126&q=cube%20red'
LogHttp: Verbose: 0000021007C46B00: Verb='GET'
LogHttp: Verbose: 0000021007C46B00: Custom headers are present
LogHttp: Verbose: 0000021007C46B00: Payload size=0
LogHttp: Verbose: 0000021007C46B00: request (easy handle:0000021061CB4D40) has been added to threaded queue for processing
LogHttp: Verbose: 0000021007C46B00: Adding header 'User-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F61B503547C723EA39E329BB0D061C50,Unknown,Editor,Original'
LogHttp: Verbose: 0000021007C46B00: Adding header 'Content-Length: 0'
LogHttp: Verbose: 0000021007C46B00: Adding header 'Expect: '
LogHttp: 0000021007C46B00: Starting GET request to URL='https://api.wit.ai/message?v=20230126&q=cube%20red'
LogHttp: Verbose: 0000021007C46B00: request (easy handle:0000021061CB4D40) has started threaded processing
LogHttp: VeryVerbose: 0000021007C46B00: ' Trying 31.13.84.56...'
LogHttp: VeryVerbose: 0000021007C46B00: 'TCP_NODELAY set'
LogHttp: VeryVerbose: 0000021007C46B00: 'Connected to api.wit.ai (31.13.84.56) port 443 (#0)'
LogHttp: VeryVerbose: 0000021007C46B00: 'ALPN, offering http/1.1'
LogHttp: VeryVerbose: 0000021007C46B00: 'Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH'
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS handshake, Client hello (1):'
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (512 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Server hello (2):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (122 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Unknown (8):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (21 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Certificate (11):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (2954 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, CERT verify (15):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (264 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Finished (20):'
LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (36 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS change cipher, Client hello (1):'
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (1 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (1 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS handshake, Finished (20):'
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (36 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'SSL connection using TLSv1.3 / TLS_CHACHA20_POLY1305_SHA256'
LogHttp: VeryVerbose: 0000021007C46B00: 'ALPN, server accepted to use http/1.1'
LogHttp: VeryVerbose: 0000021007C46B00: 'Server certificate:'
LogHttp: VeryVerbose: 0000021007C46B00: ' subject: C=US; ST=California; L=Menlo Park; O=Meta Platforms, Inc.; CN=*.wit.ai'
LogHttp: VeryVerbose: 0000021007C46B00: ' start date: Jan 8 00:00:00 2023 GMT'
LogHttp: VeryVerbose: 0000021007C46B00: ' expire date: Mar 24 23:59:59 2023 GMT'
LogHttp: VeryVerbose: 0000021007C46B00: ' subjectAltName: host "api.wit.ai" matched cert's "*.wit.ai"'
LogHttp: VeryVerbose: 0000021007C46B00: ' issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=DigiCert SHA2 High Assurance Server CA'
LogHttp: VeryVerbose: 0000021007C46B00: ' SSL certificate verify ok.'
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS Unknown, Unknown (23):'
LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (1 bytes)
LogHttp: VeryVerbose: 0000021007C46B00: Sent header (321 bytes) - GET /message?v=20230126&q=cube%20red HTTP/1.1Host: api.wit.aiAccept: */*Accept-Encoding: deflate, gzipAuthorization: Bearer SACKYPLWQTXOOMYSSXMSHJV7EAQYCJTXUser-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F61B503547C723EA39E329BB0D061C50,Unknown,Editor,OriginalCo
and here is log from pc that works
LogHttp: Verbose: 0000024F0F33A400: URL='https://api.wit.ai/message?v=20230126&q=cube%20red'
LogHttp: Verbose: 0000024F0F33A400: Verb='GET'
LogHttp: Verbose: 0000024F0F33A400: Custom headers are present
LogHttp: Verbose: 0000024F0F33A400: Payload size=0
LogHttp: Verbose: 0000024F0F33A400: request (easy handle:0000024F4D3646C0) has been added to threaded queue for processing
LogHttp: Verbose: 0000024F0F33A400: Adding header 'User-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F7D68EA4455D05A1BF5426BBE318A367,Unknown,Editor,Original'
LogHttp: Verbose: 0000024F0F33A400: Adding header 'Content-Length: 0'
LogHttp: Verbose: 0000024F0F33A400: Adding header 'Expect: '
LogHttp: 0000024F0F33A400: Starting GET request to URL='https://api.wit.ai/message?v=20230126&q=cube%20red'
LogHttp: Verbose: 0000024F0F33A400: request (easy handle:0000024F4D3646C0) has started threaded processing
LogHttp: VeryVerbose: 0000024F0F33A400: 'Connection 1 seems to be dead!'
LogHttp: VeryVerbose: 0000024F0F33A400: 'Closing connection 1'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS Unknown, Unknown (21):'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS alert, Client hello (1):'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (2 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: ' Trying 31.13.84.56...'
LogHttp: VeryVerbose: 0000024F0F33A400: 'TCP_NODELAY set'
LogHttp: VeryVerbose: 0000024F0F33A400: 'Connected to api.wit.ai (31.13.84.56) port 443 (#2)'
LogHttp: VeryVerbose: 0000024F0F33A400: 'ALPN, offering http/1.1'
LogHttp: VeryVerbose: 0000024F0F33A400: 'Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH'
LogHttp: VeryVerbose: 0000024F0F33A400: 'SSL re-using session ID'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS handshake, Client hello (1):'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (512 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Server hello (2):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (122 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Unknown (8):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (21 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Certificate (11):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (2954 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, CERT verify (15):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (264 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Finished (20):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (36 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS change cipher, Client hello (1):'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS handshake, Finished (20):'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (36 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'SSL connection using TLSv1.3 / TLS_CHACHA20_POLY1305_SHA256'
LogHttp: VeryVerbose: 0000024F0F33A400: 'ALPN, server accepted to use http/1.1'
LogHttp: VeryVerbose: 0000024F0F33A400: 'old SSL session ID is stale, removing'
LogHttp: VeryVerbose: 0000024F0F33A400: 'Server certificate:'
LogHttp: VeryVerbose: 0000024F0F33A400: ' subject: C=US; ST=California; L=Menlo Park; O=Meta Platforms, Inc.; CN=*.wit.ai'
LogHttp: VeryVerbose: 0000024F0F33A400: ' start date: Jan 8 00:00:00 2023 GMT'
LogHttp: VeryVerbose: 0000024F0F33A400: ' expire date: Mar 24 23:59:59 2023 GMT'
LogHttp: VeryVerbose: 0000024F0F33A400: ' subjectAltName: host "api.wit.ai" matched cert's "*.wit.ai"'
LogHttp: VeryVerbose: 0000024F0F33A400: ' issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=DigiCert SHA2 High Assurance Server CA'
LogHttp: VeryVerbose: 0000024F0F33A400: ' SSL certificate verify ok.'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS Unknown, Unknown (23):'
LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Sent header (321 bytes) - GET /message?v=20230126&q=cube%20red HTTP/1.1Host: api.wit.aiAccept: */*Accept-Encoding: deflate, gzipAuthorization: Bearer SACKYPLWQTXOOMYSSXMSHJV7EAQYCJTXUser-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F7D68EA4455D05A1BF5426BBE318A367,Unknown,Editor,OriginalCo
LogHttp: VeryVerbose: 0000021007C46B00: Sent header (321 bytes) - GET /message?v=20230126&q=cube%20red HTTP/1.1Host: api.wit.aiAccept: */*Accept-Encoding: deflate, gzipAuthorization: Bearer SACKYPLWQTXOOMYSSXMSHJV7EAQYCJTXUser-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F61B503547C723EA39E329BB0D061C50,Unknown,Editor,OriginalCo
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (149 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Unknown (23):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (17 bytes)
LogHttp: Verbose: 0000024F0F33A400: Received response header 'HTTP/1.1 200 OK'.
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (32 bytes)
LogHttp: Verbose: 0000024F0F33A400: Received response header 'Content-Type: application/json'.
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (32 bytes)
LogHttp: Verbose: 0000024F0F33A400: Received response header 'Access-Control-Allow-Origin: *'.
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (33 bytes)
LogHttp: Verbose: 0000024F0F33A400: Received response header 'Access-Control-Allow-Headers: *'.
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (37 bytes)
LogHttp: Verbose: 0000024F0F33A400: Received response header 'Date: Fri, 17 Mar 2023 14:05:32 GMT'.
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (24 bytes)
LogHttp: Verbose: 0000024F0F33A400: Received response header 'Connection: keep-alive'.
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (21 bytes)
LogHttp: Verbose: 0000024F0F33A400: Received response header 'Content-Length: 771'.
LogHttp: Verbose: 0000024F0F33A400: Received response header ''.
LogHttp: VeryVerbose: 0000024F0F33A400: Received header (2 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received data (1 bytes)
LogHttp: Verbose: 0000024F0F33A400: ReceiveResponseBodyCallback: 1 bytes out of 771 received. (SizeInBlocks=1, BlockSizeInBytes=1, Response->TotalBytesRead=0, Response->GetContentLength()=771, SizeToDownload=1 (<-this will get returned from the callback))
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Unknown (23):'
LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)
LogHttp: VeryVerbose: 0000024F0F33A400: Received data (770 bytes)
LogHttp: Verbose: 0000024F0F33A400: ReceiveResponseBodyCallback: 771 bytes out of 771 received. (SizeInBlocks=1, BlockSizeInBytes=770, Response->TotalBytesRead=1, Response->GetContentLength()=771, SizeToDownload=770 (<-this will get returned from the callback))
LogHttp: VeryVerbose: 0000024F0F33A400: 'Connection #2 to host api.wit.ai left intact'
LogHttp: Verbose: Request 0000024F0F33A400 (easy handle:0000024F4D3646C0) has completed (code:0) and has been marked as such
LogHttp: 0000024F0F33A400: request has been successfully processed. URL: https://api.wit.ai/message?v=20230126&q=cube%20red, HTTP code: 200, content length: 771, actual payload size: 771, elapsed: 0.61s
LogHttp: Verbose: 0000024F0F33A400 Response Header Content-Type: application/json
LogHttp: Verbose: 0000024F0F33A400 Response Header Access-Control-Allow-Origin: *
LogHttp: Verbose: 0000024F0F33A400 Response Header Access-Control-Allow-Headers: *
LogHttp: Verbose: 0000024F0F33A400 Response Header Date: Fri, 17 Mar 2023 14:05:32 GMT
LogHttp: Verbose: 0000024F0F33A400 Response Header Connection: keep-alive
LogHttp: Verbose: 0000024F0F33A400 Response Header Content-Length: 771