try
hashcat --stdout -a 6 example.dict ?d
and see output, it should be your passwords (all 25) appended with 0-9 if not, there seems to be a problem with your dict, if output is correct, than your attack is just running fine and just too fast,
in status of hahscat you can see how many passwords are tried, in your case it should be 25 (wordlist) * 10.000 so -> 250.000 passwords
the line named progress, example 3 pw in dict + ?d = 30
Progress.........: 30/30 (100.00%)
hashcat --stdout -a 6 example.dict ?d
and see output, it should be your passwords (all 25) appended with 0-9 if not, there seems to be a problem with your dict, if output is correct, than your attack is just running fine and just too fast,
in status of hahscat you can see how many passwords are tried, in your case it should be 25 (wordlist) * 10.000 so -> 250.000 passwords
the line named progress, example 3 pw in dict + ?d = 30
Progress.........: 30/30 (100.00%)