This might be obvious, but I'm baffled.. I opened a random .so library to poke around and learn IDA a bit better, and I hit something I've never seen. IDA has these instructions:
mov eax, [esp+4Ch+ptr]
mov dword ptr [eax], 665F6165h
mov dword ptr [eax+4], 6C615F66h
mov dword ptr [eax+8], 3A776F6Ch
mov dword ptr [eax+0Ch], 61736964h
mov dword ptr [eax+10h], 64656C62h
mov byte ptr [eax+14h], 0Ah
My guess is it's building some sort of struct, but it's moving dwords from addresses that don't exist in the binary (I think). When I try to jump to address 0x665F6165 for example, JumpAsk fails, which makes sense, since the hex view ends at 009636A0.. What are these weird addresses? Where are they coming from?