Valhalla Legends Archive

Programming => General Programming => C/C++ Programming => Topic started by: NicoQwertyu on November 15, 2004, 06:28 PM

Title: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 15, 2004, 06:28 PM
I've been trying to learn how to inject code into a running process for a long time now, and I still am not able to grasp it.  Yes, I've searched google numerous times  :-[.

This is a simple dll and loader I'm trying to write that will simply force Calculator.exe to load my DLL.

testdll.dll

#include "stdafx.h"
#include <windows.h>
#include <stdio.h>


extern "C" __declspec(dllexport) LRESULT CALLBACK DummieCallback(int nCode, WPARAM wParam, LPARAM lParam);


BOOL APIENTRY DllMain(HANDLE hModule, DWORD  dwReason, LPVOID lpReserved)
{

switch (dwReason)
{
case DLL_PROCESS_ATTACH: MessageBox(NULL, "DLL injected!", "OK", MB_OK); break;
case DLL_PROCESS_DETACH: MessageBox(NULL, "DLL ejected!", "OK", MB_OK); break;
}

    return TRUE;
}



extern "C" __declspec(dllexport) LRESULT CALLBACK DummieCallback(int nCode, WPARAM wParam, LPARAM lParam)
{

///////////
// This function is used for SetWindowsHookEx.
// We don't really care what it returns, but it's needed for the
// way I'm trying to do this.
//////////

return CallNextHookEx(NULL, nCode, wParam, lParam);

}




launcher

#include <windows.h>
#include <stdio.h>

int main()
{
HWND hWndProcess;
DWORD dwThreadId;
HMODULE hInjected;
HOOKPROC hDummieProc;

hWndProcess = FindWindow(NULL, "Calculator");
dwThreadId = GetWindowThreadProcessId(hWndProcess, NULL);

if (hWndProcess == 0 || dwThreadId == 0)
{
MessageBox(NULL, "Unable to gain thread id!", "ERROR", MB_OK);
return 0;
}

hInjected = LoadLibrary("testdll.dll");
hDummieProc = (HOOKPROC)GetProcAddress(hInjected, "DummieCallback");

if (hInjected == NULL || hDummieProc == NULL)
{
MessageBox(NULL, "Unable to inject DLL!", "ERROR", MB_OK);
FreeLibrary(hInjected);
return 0;
}

SetWindowsHookEx(WH_CALLWNDPROC, hDummieProc, (HINSTANCE)hInjected, dwThreadId);
return 0;
}




The few message boxes that pop up are:

DLL Injected!  (LoadLibrary returned)
Unable to inject DLL! (dwThreadId is NULL)
DLL ejected! (my program ends?)


The problem I'm having is: GetProcAddress always returns NULL, and I don't know why.  Any help would be appreciated.



[Edit]
P.S. I'm using SetWindowsHookEx instead of the other couple alternatives for injecting code because I'm on Win ME.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: MyndFyre on November 15, 2004, 06:32 PM
Quote from: NicoQwertyu on November 15, 2004, 06:28 PM
[Edit]
P.S. I'm using SetWindowsHookEx instead of the other couple alternatives for injecting code because I'm on Win ME.

That's the problem.  You're running on antiquated, unreliable, piece-of-trash code.  :P

I'll take a look at your actual code a little bit later.  For now I have to voice my disdain at Windows "Me".
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: dxoigmn on November 15, 2004, 06:32 PM
Does hInjected return NULL as well?
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 15, 2004, 06:33 PM
Quote from: dxoigmn on November 15, 2004, 06:32 PM
Does hInjected return NULL as well?

No, it doesn't.

Damn you guys are fast...
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: Adron on November 16, 2004, 03:54 PM
Make testdll.def:

library testdll
exports
    DummieCallback

Or, use dumpbin /exports to find what your function is being exported as and pass that exact string to GetProcAddress.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 16, 2004, 07:44 PM
Thanks a bunch, Adron.  I used the second suggestion and found out the export was "_DummieCallback@12".  Now calc.exe is loading my DLL, but I'm having a new problem.

I want to use inline asm to push a string onto the stack, then jmp to an address in calc.exe where it pushes the hWnd of a child window and calls SetWindowText.  I'm having a compile issue though, and I don't understand what's wrong.

Here's the asm that's giving me hell:
(This is called via my Hook)




// ...

char sBuffer[] = "Test";

// ...


__asm
{
mov eax, offset sBuffer
push eax
jmp 0x01004189
}  // <-- Line 38


This is the compile error I get:
testdll.cpp(38) : error C2415: improper operand type


Sorry if this is off-topic in the C++ forum, but I wasn't sure if I should start a new topic similar to this in the asm forum, or add it to this one.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: iago on November 16, 2004, 07:49 PM
If you want to reasearch, the book "Programming Applications in Microsoft Windows" by Jeffrey Richter has a chapter dedicated to the various methods of dll injection.  SetWindowsHookEx is one, CreateRemoteThread is another (but that's only on 2k+), and I forget the others.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: MyndFyre on November 16, 2004, 09:04 PM
Quote from: NicoQwertyu on November 16, 2004, 07:44 PM

// ...
char sBuffer[] = "Test";
// ...
__asm
{
mov eax, offset sBuffer
push eax
jmp 0x01004189
}  // <-- Line 38


This is the compile error I get:
testdll.cpp(38) : error C2415: improper operand type

Compiler error C2415 is discussed here on MSDN (http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vccore98/html/c2415.asp).

I can't imagine that Microsoft's implementation of Assembler in the C/++ compiler wouldn't let you use 0x notation for hex numbers.  Perhaps you need to "cast" it to a pointer type?


jmp dword ptr 0x01004189


Let me know how that works out for you. :)
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 16, 2004, 10:20 PM
Quote from: MyndFyre on November 16, 2004, 09:04 PM

jmp dword ptr 0x01004189


Let me know how that works out for you. :)


*sigh* No change, yet. :(

This is so aggrivating...
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: drivehappy on November 17, 2004, 12:43 AM
Does this work?

mov ip, 0x01004189
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: MyndFyre on November 17, 2004, 03:03 AM
Quote from: drivehappy on November 17, 2004, 12:43 AM
Does this work?

mov ip, 0x01004189


I didn't know that could work.  What ever happend to CS, and didn't they make an ECS or EIP?

It seems like CS/IP would be somewhat deprecated.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 06:06 AM
Quote from: drivehappy on November 17, 2004, 12:43 AM
Does this work?

mov ip, 0x01004189


No.  :-[


I can get the DLL to compile by using:


mov ecx, 0x01004189
jmp ecx


But this makes CALC.exe crash, so I must still be doing something wrong. :/
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: iago on November 17, 2004, 07:31 AM
You can't jump straight to an address, because jmp is relative.  You either move it into a register and jump to the register or, if you want to preserve registers:
push 0x010004189
ret
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: Kp on November 17, 2004, 09:59 AM
Quote from: iago on November 17, 2004, 07:31 AMYou can't jump straight to an address, because jmp is relative.

Actually, you can.  It just requires GNU tools and a bit of cleverness. :)
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: MyndFyre on November 17, 2004, 11:33 AM
Quote from: iago on November 17, 2004, 07:31 AM
You can't jump straight to an address, because jmp is relative.  You either move it into a register and jump to the register or, if you want to preserve registers:
push 0x010004189
ret


Since when is jmp relative?  I thought there were a plethora of adressing modes, where the one he's using is an absolute.  :/

Edit: nvm, I'm a retard.  I guess I just don't get 32-bit addressing.  I remember that when you jmp'd on the 8086, you did it within the code segment.  It just seems to me that when you're running a 32-bit processor with 32-bit memory address registers, you ought to be able to jump to an absolute memory address.  Of course I can see where protection issues would arise...

:-/
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 11:34 AM
Do you guys know of anything else that could be wrong with the code I have thus far?  After the DLL is injected, two message boxes pop up informing me that "CALC.exe caused in error in <unknown>", then closes.  

I'm at school, but when I get home I'll try to debug it.  I'm pretty new to this though, so any input would be appreciated.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: iago on November 17, 2004, 12:24 PM
There are tons of things that can go wrong when injecting assembly, but the major things are:
- Make sure ESP DOESN'T CHANGE
- Make sure you preserve all registers that are used after your patch
- Make sure you're returning to the correct address

The first two are the same, basically, but it's VERY important that the stack be EXACTLY the same when you return.  Also don't forget that call and ret both modify the stack pointer.

Debugging it, and stepping through the area where you made the patch, keeping track of registers, is probably your best bet.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: Skywing on November 17, 2004, 01:24 PM
I typically use one of the following:


const unsigned long jmpdest = 0xnnnnnnnn;

.
.
.

jmp dword ptr [jmpdest]


Or...


mov eax, 0xnnnnnnnn
jmp eax
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 01:37 PM
Quote from: iago on November 17, 2004, 12:24 PM
There are tons of things that can go wrong when injecting assembly, but the major things are:
- Make sure ESP DOESN'T CHANGE
- Make sure you preserve all registers that are used after your patch
- Make sure you're returning to the correct address

The first two are the same, basically, but it's VERY important that the stack be EXACTLY the same when you return.  Also don't forget that call and ret both modify the stack pointer.

Debugging it, and stepping through the area where you made the patch, keeping track of registers, is probably your best bet.

After stepping through it in a debugger: my code executes, jumps to the correct address, does what I want it to, hits a "retn 0", then ends up somewhere else where it, according to the debugger, has an "access violation when reading [FFFFFFFF]".  How can I fix whatever's going wrong?  :-[


[Edit]
The instruction it keeps getting stuck on is:
0x0056F362  0000  ADD BYTE PTR DS:[EAX], AL
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: drivehappy on November 17, 2004, 02:04 PM
@NicoQwertyu: Can you post stack information before your code is executed and then again at the jmp? Can you also post some more instructions before the access violation one?
@MyndFyre: I had meant EIP, it could very well be incorrect though (I'm used to 8051).
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 02:28 PM
Quote from: drivehappy on November 17, 2004, 02:04 PM
@NicoQwertyu: Can you post stack information before your code is executed and then again at the jmp? Can you also post some more instructions before the access violation one?
@MyndFyre: I had meant EIP, it could very well be incorrect though (I'm used to 8051).

I'd be more than happy to.

...

This is around my 4th time using a debugger, what exactly am I posting when you ask for "stack information?"

Sorry for my ignorance. :/
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: MyndFyre on November 17, 2004, 03:03 PM
Quote from: NicoQwertyu on November 17, 2004, 01:37 PM
After stepping through it in a debugger: my code executes, jumps to the correct address, does what I want it to, hits a "retn 0", then ends up somewhere else where it, according to the debugger, has an "access violation when reading [FFFFFFFF]".  How can I fix whatever's going wrong?  :-[

It's hitting a ret instruction?  Perhaps you need to use call rather than jmp in your code.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 03:13 PM
Quote from: MyndFyre on November 17, 2004, 03:03 PM
Quote from: NicoQwertyu on November 17, 2004, 01:37 PM
After stepping through it in a debugger: my code executes, jumps to the correct address, does what I want it to, hits a "retn 0", then ends up somewhere else where it, according to the debugger, has an "access violation when reading [FFFFFFFF]".  How can I fix whatever's going wrong?  :-[

It's hitting a ret instruction?  Perhaps you need to use call rather than jmp in your code.

That wouldn't work for what I want it to do.  And it should hit a ret, shouldn't it?  The address I jump to is in the middle of a function.   :o
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: drivehappy on November 17, 2004, 03:51 PM
Quote from: NicoQwertyu on November 17, 2004, 03:13 PM
Quote from: MyndFyre on November 17, 2004, 03:03 PM
Quote from: NicoQwertyu on November 17, 2004, 01:37 PM
After stepping through it in a debugger: my code executes, jumps to the correct address, does what I want it to, hits a "retn 0", then ends up somewhere else where it, according to the debugger, has an "access violation when reading [FFFFFFFF]".  How can I fix whatever's going wrong?  :-[

It's hitting a ret instruction?  Perhaps you need to use call rather than jmp in your code.

That wouldn't work for what I want it to do. And it should hit a ret, shouldn't it? The address I jump to is in the middle of a function. :o
That's probably your problem. When that function is called it pushes values onto the stack that correspond to parameters and the address at which it was called. Return I *believe* will revert EIP to the original address after which the call statement was made, any parameters should be popped off within the function. Again, I'm not 100% sure of the order. So when you jump inside the function and ret is reached it will try popping values off the stack that are incorrect. You should always have pairs of pushes and pops for the stack.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: MyndFyre on November 17, 2004, 03:58 PM
Quote from: NicoQwertyu on November 17, 2004, 03:13 PM
Quote from: MyndFyre on November 17, 2004, 03:03 PM
Quote from: NicoQwertyu on November 17, 2004, 01:37 PM
After stepping through it in a debugger: my code executes, jumps to the correct address, does what I want it to, hits a "retn 0", then ends up somewhere else where it, according to the debugger, has an "access violation when reading [FFFFFFFF]".  How can I fix whatever's going wrong?  :-[

It's hitting a ret instruction?  Perhaps you need to use call rather than jmp in your code.

That wouldn't work for what I want it to do.  And it should hit a ret, shouldn't it?  The address I jump to is in the middle of a function.   :o

Sure it would.  You can call an address directly last I checked.

When CALL is used, a pointer to the next instruction in memory is saved (and code segment?) on the stack.  RET pops them off of the stack.  So, you're probably trying to read the instruction at 0xffffffff, because that was the value popped off the stack, and are subsequently getting an access violation.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: iago on November 17, 2004, 04:07 PM
When you do a call, it does this:
push return address;
jump location

When you do a return, it does:
pop return address->current location

You need to have a "call" before you can have a "ret", otherwise it has no idea where to return to.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 04:18 PM
Ok, I understand the importance of call now, bust it still errors; now there's an access violation at 0x24291EF1 (doesn't exist), which is where it goes after the return.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: Skywing on November 17, 2004, 04:42 PM
Perhaps you might post your entire hook, where you are installing it (and what instructions you are patching in), and a disassembly of the target function in calc.exe.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 05:02 PM
Quote from: Skywing on November 17, 2004, 04:42 PM
Perhaps you might post your entire hook, where you are installing it (and what instructions you are patching in), and a disassembly of the target function in calc.exe.




DLL to be injected:


#include "stdafx.h"
#include <windows.h>
#include <stdio.h>


extern "C" __declspec(dllexport) LRESULT CALLBACK DummieCallback(int nCode, WPARAM wParam, LPARAM lParam);


HWND hWnd = FindWindow(NULL, "Calculator");
char sBuffer[] = "test";

BOOL APIENTRY DllMain(HANDLE hModule, DWORD  dwReason, LPVOID lpReserved)
{
    return TRUE;
}



extern "C" __declspec(dllexport) LRESULT CALLBACK DummieCallback(int nCode, WPARAM wParam, LPARAM lParam)
{

///////////
//////////

MSG *msg = (MSG*)lParam;

if (nCode < 0)
{
return CallNextHookEx((HHOOK)0, nCode, wParam, lParam);
} else {

_asm
{
mov eax, offset sBuffer
push eax
mov ecx, 0x01004189
call ecx
}

MessageBeep(MB_OK);

return CallNextHookEx((HHOOK)0, nCode, wParam, lParam);
}



}


(Right now it's only purpose to put the text "Test" in whatever window the calulator uses to display it's stuff evertime calc.exe recieves a message)


Code that injects DLL:


#include <windows.h>
#include <stdio.h>

int main()
{
HWND hWndProcess;
DWORD dwThreadId;
HMODULE hInjected;
HOOKPROC hDummieProc;

hWndProcess = FindWindow(NULL, "Calculator");
dwThreadId = GetWindowThreadProcessId(hWndProcess, NULL);

if (hWndProcess == 0 || dwThreadId == 0)
{
MessageBox(NULL, "Unable to gain thread id!", "ERROR", MB_OK);
return 0;
}

hInjected = LoadLibrary("testdll.dll");
hDummieProc = (HOOKPROC)GetProcAddress(hInjected, "_DummieCallback@12");

if (hInjected == NULL || hDummieProc == NULL)
{
MessageBox(NULL, "Unable to inject DLL!", "ERROR", MB_OK);
FreeLibrary(hInjected);
return 0;
}

SetWindowsHookEx(WH_CALLWNDPROC, (HOOKPROC)hDummieProc, (HINSTANCE)hInjected, dwThreadId);
return 0;
}




Target function:

Quote

01004166   PUSH ESI
01004167   PUSH EDI
01004168   PUSH 193
0100416D   PUSH DWORD PTR SS:[ESP+10]
01004171   CALL DWORD PTR DS:[<&USER32.GetDlgItem>]

01004177   MOV ESI,EAX
01004179   PUSH DWORD PTR SS:[ESP+10]
0100417D   CALL DWORD PTR DS:[<&KERNEL32.lstrlenA>]

01004183   MOV EDI,EAX
01004185   PUSH DWORD PTR SS:[ESP+10]                  ; Push Text
01004189   PUSH ESI                                                ; <---- I jump in here (push hWnd)
0100418A   CALL DWORD PTR DS:[<&USER32.SetWindowTextA>]

01004190   PUSH ESI
01004191   CALL DWORD PTR DS:[<&USER32.SetFocus>]

01004197   PUSH EDI
01004198   PUSH EDI
01004199   PUSH 0B1
0100419E   PUSH ESI
0100419F   CALL DWORD PTR DS:[<&USER32.SendMessageA>]

010041A5   PUSH 1
010041A7   POP EAX
010041A8   POP EDI
010041A9   POP ESI

010041AA   RETN 8
Title: Assembly analysis
Post by: Kp on November 17, 2004, 05:25 PM
Based on a cursory look, your hook just won't work at all the way you wrote it.  For one thing, you jump to an instruction which pushes esi, but you didn't set up esi first.  Therefore, the wrong window handle will be passed to SetWindowTextA.  The original function sets esi using GetDlgItem, but your jump bypasses that.  From the look of that function, you ought to be able to call the function from the beginning.
Title: Re: Assembly analysis
Post by: NicoQwertyu on November 17, 2004, 10:28 PM
Quote from: Kp on November 17, 2004, 05:25 PM
Based on a cursory look, your hook just won't work at all the way you wrote it.  For one thing, you jump to an instruction which pushes esi, but you didn't set up esi first.  Therefore, the wrong window handle will be passed to SetWindowTextA.  The original function sets esi using GetDlgItem, but your jump bypasses that.  From the look of that function, you ought to be able to call the function from the beginning.

But if I called the function from the beginning, I wouldn't be able to change what text it puts in the textbox, which was the goal I was trying to reach.  :-\
Title: Re: Assembly analysis
Post by: Kp on November 17, 2004, 10:46 PM
Quote from: NicoQwertyu on November 17, 2004, 10:28 PMBut if I called the function from the beginning, I wouldn't be able to change what text it puts in the textbox, which was the goal I was trying to reach.  :-\

Why not?  If you look at that function, the text to place in the window is passed as an argument already.  Just put a pointer to it on the stack and call the code from the beginning.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 17, 2004, 11:10 PM
Quote
If you look at that function, the text to place in the window is passed as an argument already.

Perhaps understanding what "dword ptr ss:[esp+10]" is will help..

*Google*

[Edit]

Random Google Result:
Quote
Lets take a look at our program entry point. It is defined as:

WinMain( hInstance, hPrevInstance, lpszCmdLine, nCmdShow);

Thus our program is just treated as an ordinary function with the following dword values on the stack:

[esp+16]: nCmdShow    ;value determining if the program window should be displayed normal, fullscreen or minimized
[esp+12]: lpszCmdLine ;address of the command line
[esp+8]:  0           ;always 0 in Win32
[esp+4]:  hInstance   ;instance handle of the current process
[esp+0]:  stacked EIP ;return address


So I guess dword ptr ss:[esp+10] is the argument being passed that you're talking about.  But why +10?  How is it esp+10??  :-[
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: iago on November 18, 2004, 06:09 AM
You need to learn how to pass argument on the stack.  It's a very important concept.  Basically, to call:
void func(int a, int b, int c);
with the arguments:
func(1, 2, 3)

it does:
push 3
push 2
push 1
call func
(by convention)

When you're in the function
[esp] = return address
[esp+4] = 1
[esp+8] = 2
esp+c] = 3

Of course, this also depends on optimizations and stuff.  If optimizations are off, esp is usually changed and ebp is what is used to access the parameters.  I'd recommend you read up on how the stack and frame pointers work.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: NicoQwertyu on November 18, 2004, 08:39 AM
How do they get to esp+10, though?  Doesn't it go by 4's?
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: MyndFyre on November 18, 2004, 10:48 AM
Quote from: NicoQwertyu on November 18, 2004, 08:39 AM
How do they get to esp+10, though?  Doesn't it go by 4's?

esp+10 -- are you in hex?  That's 16 decimal.

If it's +10 and you're NOT in hex, that means that you've got a short integer being passed by value somewhere.  :)
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: Skywing on November 18, 2004, 12:59 PM
More likely it would mean the program is broken because every calling convention I know of keeps the stack aligned.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: K on November 19, 2004, 06:25 PM
Quote from: Skywing on November 18, 2004, 12:59 PM
More likely it would mean the program is broken because every calling convention I know of keeps the stack aligned.

The compiler we use to write programs for the MC68000 has a -Zp2 option which passes shorts (and chars/bytes) as 2 bytes. ;)
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: Skywing on November 19, 2004, 08:06 PM
Quote from: K on November 19, 2004, 06:25 PM
Quote from: Skywing on November 18, 2004, 12:59 PM
More likely it would mean the program is broken because every calling convention I know of keeps the stack aligned.

The compiler we use to write programs for the MC68000 has a -Zp2 option which passes shorts (and chars/bytes) as 2 bytes. ;)
To clarify: Every compiler-supported calling convention used by x86-Win32 that I know of.
Title: Re: Injecting a DLL via SetWindowsHookEx
Post by: Adron on November 27, 2004, 08:34 AM
Quote from: NicoQwertyu on November 18, 2004, 08:39 AM
How do they get to esp+10, though?  Doesn't it go by 4's?

Like others have said, it's hex. And note that you need to take into account the pushes in the function:

01004166   PUSH ESI ; here return address is [esp] and arg is [esp+4]
01004167   PUSH EDI ; here return address is [esp+4] and arg is [esp+8]
01004168   PUSH 193 ; here return address is [esp+8] and arg is [esp+c]
0100416D   PUSH DWORD PTR SS:[ESP+10] ; here return address is [esp+c] and arg is [esp+10]