They are just fake "addresses" generated by your IL disassembler. The LDSTR opcode requires one byte for the opcode, 0x72, and 4 bytes for the operand. Which is a token value that selects the string from the metadata table that stores string literals. So the next IL opcode starts at offset 5. Same recipe there, CALL requires one byte for the opcode, 0x28, and 4 bytes for the operand, the method token. So the next IL opcode starts at offset 10. RET requires 1 byte, 0x2A and has no operand. Total IL code size is 11 bytes.
Your disassembler generates these "addresses" to show you the target of a branch instruction. You don't have one, try disassembling code that uses an if() statement to see that. They are otherwise immaterial since the jitter translates this code to machine code which looks very different.