![regex non capturing group regex non capturing group](https://www.salvis.com/blog/wp-content/uploads/2018/09/regex.png)
#Regex non capturing group update#
11:59:34, Virus found, IP Address: 172.16.10.151, Computer name: U1135713, Source: Auto-Protect scan, Risk name:, Occurrences: 1, File path: C:\Windows\DVV\v4.0.6\namespace\\user\user0\IUWGR\personal work\maliciousfile.exe, Description:, Actual action: Deleted, Requested action: Cleaned, Secondary action: Deleted, Event time: 11:55:57, Event Insert Time: 11:59:34, End Time: 11:55:57, Last update time: 11:59:34, Domain Name: Default, Group Name: My Company\HODW - Server\HODW - HODW\HODW - Windows 10\HODW - BHTPN - Online Default, Server Name: FGTY1ADA02, User Name: IUWGR, Source Computer Name: U1135713.
![regex non capturing group regex non capturing group](https://i.stack.imgur.com/vOYlL.png)
![regex non capturing group regex non capturing group](https://i.stack.imgur.com/5NnEP.png)
#Regex non capturing group serial#
21:36:33, Compressed File, IP Address: 192.168.1.1, Computer name: GHCC01SFG435, Source: Scheduled scan, Risk name:, Occurrences: 1, File path: T:\Tower\Installer\fgg5cfef.msi, Description: Still contains 1 infected items, Actual action: Quarantined, Requested action: Quarantined, Secondary action: Left alone, Event time: 21:33:58, Event Insert Time: 21:36:33, End Time: 21:33:58, Last update time: 21:36:33, Domain Name: Default, Group Name: My Company\HODW - Server\HODW - Development, Server Name: FGTY1ADA02, User Name: SYSTEM, Source Computer Name:, Source Computer IP:, Disposition: Good, Download site: null, Web domain: null, Downloaded by: null, Prevalence: Reputation was not used in this detection., Confidence: Reputation was not used in this detection., URL Tracking Status: Off, First Seen: Reputation was not used in this detection., Sensitivity: Low, Permitted application reason: Not on the permitted application list, Application hash:, Hash type: SHA1, Company name:, Application name:, Application version:, Application type: -1, File size ( bytes) : 0, Category set: Malware, Category type: Heuristic Virus, Location: Default, Intensive Protection Level: 0, Certificate issuer:, Certificate signer:, Certificate thumbprint:, Signing timestamp:, Certificate serial number: I have marked the fields in bold that I am attempting to extract. The following example illustrates a regular expression that identifies duplicated words and the word that immediately follows each duplicated word. The first capturing group (number 0) always refers to the entire pattern.
Again the computer names change in length, consistency per result The regular expression ( (Here's some example raw data that I am working with.