If I recall what Fabian stated, the Emsisoft anti-exploit feature does not utilize mitigations but instead by another means. It would make sense that the other means is the behavior blocker. For example, when an Office program macro attempts to access an interprter, there is a suspicious action alert. Also, the Microsoft Office program is terminated. You can see it in action by testing a weaponized Excel or Word document.