I know the virtual memory separates 2G(for kernel)/2G(for user) in Windows. But why the address of variable isn't stack continually?
Likes 0x22ff74,0x22ff78,0x22ff82,0x22ff86 ? Does it mean that Windows use sandbox mechanism in user process?
See Question&Answers more detail:os