There are a number of tools that cover char strings in IDA. If you are not familiar with char strings it's a low hanging obfuscation technique to thwart analyst from viewing the strings inside of an executable.
more here.........http://hooked-on-mnemonics.blogspot.com/2014/09/backtrace-poc-stack-strings.html
more here.........http://hooked-on-mnemonics.blogspot.com/2014/09/backtrace-poc-stack-strings.html