I've got problem with HTTP responses. They are skipped by the Engine but I can see them in 3rd party packet sniffer.

I reseted firewall rules and don’t see anything related to sdk on both machines.
Here is veryverbose LogHttp from pc that doesn’t work

LogHttp: Verbose: 0000021007C46B00: URL='https://api.wit.ai/message?v=20230126&q=cube%20red'

LogHttp: Verbose: 0000021007C46B00: Verb='GET'

LogHttp: Verbose: 0000021007C46B00: Custom headers are present

LogHttp: Verbose: 0000021007C46B00: Payload size=0

LogHttp: Verbose: 0000021007C46B00: request (easy handle:0000021061CB4D40) has been added to threaded queue for processing

LogHttp: Verbose: 0000021007C46B00: Adding header 'User-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F61B503547C723EA39E329BB0D061C50,Unknown,Editor,Original'

LogHttp: Verbose: 0000021007C46B00: Adding header 'Content-Length: 0'

LogHttp: Verbose: 0000021007C46B00: Adding header 'Expect: '

LogHttp: 0000021007C46B00: Starting GET request to URL='https://api.wit.ai/message?v=20230126&q=cube%20red'

LogHttp: Verbose: 0000021007C46B00: request (easy handle:0000021061CB4D40) has started threaded processing

LogHttp: VeryVerbose: 0000021007C46B00: ' Trying 31.13.84.56...'

LogHttp: VeryVerbose: 0000021007C46B00: 'TCP_NODELAY set'

LogHttp: VeryVerbose: 0000021007C46B00: 'Connected to api.wit.ai (31.13.84.56) port 443 (#0)'

LogHttp: VeryVerbose: 0000021007C46B00: 'ALPN, offering http/1.1'

LogHttp: VeryVerbose: 0000021007C46B00: 'Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH'

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS handshake, Client hello (1):'

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (512 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Server hello (2):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (122 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Unknown (8):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (21 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Certificate (11):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (2954 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, CERT verify (15):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (264 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (IN), TLS handshake, Finished (20):'

LogHttp: VeryVerbose: 0000021007C46B00: Received SSL data (36 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS change cipher, Client hello (1):'

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (1 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (1 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS handshake, Finished (20):'

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (36 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'SSL connection using TLSv1.3 / TLS_CHACHA20_POLY1305_SHA256'

LogHttp: VeryVerbose: 0000021007C46B00: 'ALPN, server accepted to use http/1.1'

LogHttp: VeryVerbose: 0000021007C46B00: 'Server certificate:'

LogHttp: VeryVerbose: 0000021007C46B00: ' subject: C=US; ST=California; L=Menlo Park; O=Meta Platforms, Inc.; CN=*.wit.ai'

LogHttp: VeryVerbose: 0000021007C46B00: ' start date: Jan 8 00:00:00 2023 GMT'

LogHttp: VeryVerbose: 0000021007C46B00: ' expire date: Mar 24 23:59:59 2023 GMT'

LogHttp: VeryVerbose: 0000021007C46B00: ' subjectAltName: host "api.wit.ai" matched cert's "*.wit.ai"'

LogHttp: VeryVerbose: 0000021007C46B00: ' issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=DigiCert SHA2 High Assurance Server CA'

LogHttp: VeryVerbose: 0000021007C46B00: ' SSL certificate verify ok.'

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: 'TLSv1.3 (OUT), TLS Unknown, Unknown (23):'

LogHttp: VeryVerbose: 0000021007C46B00: Sent SSL data (1 bytes)

LogHttp: VeryVerbose: 0000021007C46B00: Sent header (321 bytes) - GET /message?v=20230126&q=cube%20red HTTP/1.1Host: api.wit.aiAccept: */*Accept-Encoding: deflate, gzipAuthorization: Bearer SACKYPLWQTXOOMYSSXMSHJV7EAQYCJTXUser-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F61B503547C723EA39E329BB0D061C50,Unknown,Editor,OriginalCo

and here is log from pc that works

LogHttp: Verbose: 0000024F0F33A400: URL='https://api.wit.ai/message?v=20230126&q=cube%20red'

LogHttp: Verbose: 0000024F0F33A400: Verb='GET'

LogHttp: Verbose: 0000024F0F33A400: Custom headers are present

LogHttp: Verbose: 0000024F0F33A400: Payload size=0

LogHttp: Verbose: 0000024F0F33A400: request (easy handle:0000024F4D3646C0) has been added to threaded queue for processing

LogHttp: Verbose: 0000024F0F33A400: Adding header 'User-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F7D68EA4455D05A1BF5426BBE318A367,Unknown,Editor,Original'

LogHttp: Verbose: 0000024F0F33A400: Adding header 'Content-Length: 0'

LogHttp: Verbose: 0000024F0F33A400: Adding header 'Expect: '

LogHttp: 0000024F0F33A400: Starting GET request to URL='https://api.wit.ai/message?v=20230126&q=cube%20red'

LogHttp: Verbose: 0000024F0F33A400: request (easy handle:0000024F4D3646C0) has started threaded processing

LogHttp: VeryVerbose: 0000024F0F33A400: 'Connection 1 seems to be dead!'

LogHttp: VeryVerbose: 0000024F0F33A400: 'Closing connection 1'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS Unknown, Unknown (21):'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS alert, Client hello (1):'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (2 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: ' Trying 31.13.84.56...'

LogHttp: VeryVerbose: 0000024F0F33A400: 'TCP_NODELAY set'

LogHttp: VeryVerbose: 0000024F0F33A400: 'Connected to api.wit.ai (31.13.84.56) port 443 (#2)'

LogHttp: VeryVerbose: 0000024F0F33A400: 'ALPN, offering http/1.1'

LogHttp: VeryVerbose: 0000024F0F33A400: 'Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH'

LogHttp: VeryVerbose: 0000024F0F33A400: 'SSL re-using session ID'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS handshake, Client hello (1):'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (512 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Server hello (2):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (122 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Unknown (8):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (21 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Certificate (11):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (2954 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, CERT verify (15):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (264 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Finished (20):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (36 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS change cipher, Client hello (1):'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS handshake, Finished (20):'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (36 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'SSL connection using TLSv1.3 / TLS_CHACHA20_POLY1305_SHA256'

LogHttp: VeryVerbose: 0000024F0F33A400: 'ALPN, server accepted to use http/1.1'

LogHttp: VeryVerbose: 0000024F0F33A400: 'old SSL session ID is stale, removing'

LogHttp: VeryVerbose: 0000024F0F33A400: 'Server certificate:'

LogHttp: VeryVerbose: 0000024F0F33A400: ' subject: C=US; ST=California; L=Menlo Park; O=Meta Platforms, Inc.; CN=*.wit.ai'

LogHttp: VeryVerbose: 0000024F0F33A400: ' start date: Jan 8 00:00:00 2023 GMT'

LogHttp: VeryVerbose: 0000024F0F33A400: ' expire date: Mar 24 23:59:59 2023 GMT'

LogHttp: VeryVerbose: 0000024F0F33A400: ' subjectAltName: host "api.wit.ai" matched cert's "*.wit.ai"'

LogHttp: VeryVerbose: 0000024F0F33A400: ' issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=DigiCert SHA2 High Assurance Server CA'

LogHttp: VeryVerbose: 0000024F0F33A400: ' SSL certificate verify ok.'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (OUT), TLS Unknown, Unknown (23):'

LogHttp: VeryVerbose: 0000024F0F33A400: Sent SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Sent header (321 bytes) - GET /message?v=20230126&q=cube%20red HTTP/1.1Host: api.wit.aiAccept: */*Accept-Encoding: deflate, gzipAuthorization: Bearer SACKYPLWQTXOOMYSSXMSHJV7EAQYCJTXUser-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F7D68EA4455D05A1BF5426BBE318A367,Unknown,Editor,OriginalCo

LogHttp: VeryVerbose: 0000021007C46B00: Sent header (321 bytes) - GET /message?v=20230126&q=cube%20red HTTP/1.1Host: api.wit.aiAccept: */*Accept-Encoding: deflate, gzipAuthorization: Bearer SACKYPLWQTXOOMYSSXMSHJV7EAQYCJTXUser-Agent: wit-unreal-49.0.1,wit-unreal,Windows-10.0.19045.1.256.64bit,Unknown,F61B503547C723EA39E329BB0D061C50,Unknown,Editor,OriginalCo

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Certificate Status (22):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (149 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Unknown (23):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (17 bytes)

LogHttp: Verbose: 0000024F0F33A400: Received response header 'HTTP/1.1 200 OK'.

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (32 bytes)

LogHttp: Verbose: 0000024F0F33A400: Received response header 'Content-Type: application/json'.

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (32 bytes)

LogHttp: Verbose: 0000024F0F33A400: Received response header 'Access-Control-Allow-Origin: *'.

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (33 bytes)

LogHttp: Verbose: 0000024F0F33A400: Received response header 'Access-Control-Allow-Headers: *'.

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (37 bytes)

LogHttp: Verbose: 0000024F0F33A400: Received response header 'Date: Fri, 17 Mar 2023 14:05:32 GMT'.

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (24 bytes)

LogHttp: Verbose: 0000024F0F33A400: Received response header 'Connection: keep-alive'.

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (21 bytes)

LogHttp: Verbose: 0000024F0F33A400: Received response header 'Content-Length: 771'.

LogHttp: Verbose: 0000024F0F33A400: Received response header ''.

LogHttp: VeryVerbose: 0000024F0F33A400: Received header (2 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received data (1 bytes)

LogHttp: Verbose: 0000024F0F33A400: ReceiveResponseBodyCallback: 1 bytes out of 771 received. (SizeInBlocks=1, BlockSizeInBytes=1, Response->TotalBytesRead=0, Response->GetContentLength()=771, SizeToDownload=1 (<-this will get returned from the callback))

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (5 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: 'TLSv1.3 (IN), TLS Unknown, Unknown (23):'

LogHttp: VeryVerbose: 0000024F0F33A400: Received SSL data (1 bytes)

LogHttp: VeryVerbose: 0000024F0F33A400: Received data (770 bytes)

LogHttp: Verbose: 0000024F0F33A400: ReceiveResponseBodyCallback: 771 bytes out of 771 received. (SizeInBlocks=1, BlockSizeInBytes=770, Response->TotalBytesRead=1, Response->GetContentLength()=771, SizeToDownload=770 (<-this will get returned from the callback))

LogHttp: VeryVerbose: 0000024F0F33A400: 'Connection #2 to host api.wit.ai left intact'

LogHttp: Verbose: Request 0000024F0F33A400 (easy handle:0000024F4D3646C0) has completed (code:0) and has been marked as such

LogHttp: 0000024F0F33A400: request has been successfully processed. URL: https://api.wit.ai/message?v=20230126&q=cube%20red, HTTP code: 200, content length: 771, actual payload size: 771, elapsed: 0.61s

LogHttp: Verbose: 0000024F0F33A400 Response Header Content-Type: application/json

LogHttp: Verbose: 0000024F0F33A400 Response Header Access-Control-Allow-Origin: *

LogHttp: Verbose: 0000024F0F33A400 Response Header Access-Control-Allow-Headers: *

LogHttp: Verbose: 0000024F0F33A400 Response Header Date: Fri, 17 Mar 2023 14:05:32 GMT

LogHttp: Verbose: 0000024F0F33A400 Response Header Connection: keep-alive

LogHttp: Verbose: 0000024F0F33A400 Response Header Content-Length: 771