Bob Dorr shows off Arvind’s SQL Call Stack Resolver:
Some outputs, such as the XEvent call stack action output the raw stack frame information and require a rebase to loaded module information in order to symbolize. The security feature for random address virtualization loads images at different addresses each time the image is loaded. This requires the module base address and the raw address in order to calculate the relative virtual address for symbolization.
Click through for more information.