It seems that with the release of EMET 5.5 there is still a problem with Norton and the Caller mitigation as reported and supposedly fixed in this thread: https://community.norton.com/en/forums/emet-52-will-not-allow-adobe-reader-xi-open-caller-issue. This seems to happen with any software that uses the open/save/save as dialogue boxes. In my case it is on windows 10 64bit Version: 10.0.10586. NSBU is V22.5.5.15 and fully up to date patch wise as is windows.
EMET version 5.5.5871.31892
EMET detected Caller mitigation and will close the application: OUTLOOK.EXE
Caller check failed:
Application : C:\Program Files (x86)\Microsoft Office\Office12\OUTLOOK.EXE
User Name :
Session ID : 2
PID : 0x1BF8 (7160)
TID : 0x1F9C (8092)
API Name : ntdll.NtCreateFile
ReturnAddress : 0x1AD3D15B
CalledAddress : 0x770A7040
TargetAddress : 0x1AD3BEA0
StackPtr : 0x1A66F41C
EMET version 5.5.5871.31892
EMET detected Caller mitigation and will close the application: WINWORD.EXE
Caller check failed:
Application : C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE
User Name :
Session ID : 0
PID : 0x24FC (9468)
TID : 0x6A8 (1704)
API Name : ntdll.NtCreateFile
ReturnAddress : 0x06C8D15B
Faulting application name: AcroRd32.exe, version: 15.10.20056.36345, time stamp: 0x56741546
Faulting module name: EMET.DLL, version: 5.5.5870.0, time stamp: 0x56aac435
Exception code: 0xc0000409
Fault offset: 0x00062596
Faulting process ID: 0xca4
Faulting application start time: 0x01d15e74d5bf68db
Faulting application path: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Faulting module path: C:\WINDOWS\AppPatch\EMET.DLL
Report ID: d1af1cec-91b8-46b2-9617-f1775d0b337f
Faulting package full name:
Faulting package-relative application ID:
EMET version 5.5.5871.31892
EMET detected Caller mitigation and will close the application: AcroRd32.exe
Caller check failed:
Application : C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
User Name :
Session ID : 2
PID : 0xCA4 (3236)
TID : 0x136C (4972)
API Name : ntdll.NtCreateFile
ReturnAddress : 0x06CCD15B
CalledAddress : 0x770A7040
TargetAddress : 0x06CCBEA0
StackPtr : 0x0589F79C