Note that this particular memory is often used by kernel exploits to store their shellcode. It's memory address is stable across different Windows version, the pages used to be executable, it's a huge address space, and it is seldom used for anything.
Even in the latest version, if you can get around SMEP and toggle the executable bit in its pages (or disable SMEP), you can still run shellcode directly from it.
Even in the latest version, if you can get around SMEP and toggle the executable bit in its pages (or disable SMEP), you can still run shellcode directly from it.