Back in 4.3.14 VirtualBox introduced a new security feature on Windows Hosts: HARDENING.
This was introduced to guard against the possibility that malware running on the HOST could inject a DLL1 into a VM which could then run at elevated privileges (hiding behind Oracle certification) which would be denied to it if it were to run stand alone. The technology press wrote scare stores about this possibility, and with the reputation of Oracle and VirtualBox at stake the problem could not be ignored. Note that the concern is that this injected DLL could use elevated privileges to attack the HOST, we aren't merely talking guest OS malware here.
1 DLL == Dynamic Link Library, an executable file which is loaded and linked at runtime and runs in the context of a parent program. The Windows OS makes extensive use of DLLs, just look at the \Windows\System32 folder some time! Injecting a DLL means to trick a process into loading a "foreign" library module that it wouldn't ordinarily have loaded.