what i find out is that Apache has a Symantec Endpoint Protection\apache\conf\ssl\sslforclient.conf file, where it can be seen the why it handles certificates is different between versions. and is why one version can work and not another one.
at the moment i am not sure what the difference mean, but try to find out why its causing a problem on the newest version
# connect with. Disable SSLv2 by default (cf. RFC 6176).
####APACHE_DIRECTIVE_MERGE for_14.0.0.0
SSLProtocol all -SSLv2 -SSLv3
# SSL Strong Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
# 3DES is required in order to support WinXP, Win2003 as
# these OS do not have AES cipher support out of the box.
# We no longer support these OSes without modern patches, re-enable
# 3DES if your environment does.
####APACHE_DIRECTIVE_OVERRIDE for_14.1.1.0
SSLCipherSuite HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:!3DES:!RC4
# Server Certificate:
# Point SSLCertificateFile at a PEM encoded certificate. If
# the certificate is encrypted, then you will be prompted for a
# pass phrase. Note that a kill -HUP will prompt again. Keep
# in mind that if you have both an RSA and a DSA certificate you
# can configure both in parallel (to also allow the use of DSA
# ciphers, etc.)
SSLCertificateFile "conf/ssl/server.crt"
####APACHE_DIRECTIVE_REMOVE
#:Removed_by_14.2.0.0_upgrade_wizard Wed Jun 20 14:59:47 CEST 2018:# SSLDHParametersFile
# Server Private Key:
# If the key is not combined with the certificate, use this
# directive to point at the key file. Keep in mind that if
# you've both a RSA and a DSA private key you can configure
# both in parallel (to also allow the use of DSA ciphers, etc.)
SSLCertificateKeyFile conf/ssl/server.key