Please do not bump your topics, we are all volunteers here who give our time freely to try and help others but alas we cannot be here 24/7 due to other commitments such as family and work, if you think your topic may have been overlooked send the person helping you a polite PM or alternatively post in the Waiting Room and someone will respond asap, note that you must have been waiting for 3 days or more before posting in the Waiting Room, incidentally I was working my way through the list of topics I am helping with when I received the bump to your thread.
uTorrent and your AV protection are both shown in your crash dumps, are you using Windows Defender.
Uninstall uTorrents and see if the issue is resolved.
Your crash dumps are all the same, see below and what I have highlighted in red in particular;
Windows 8 Kernel Version 9200 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16461.amd64fre.win8_gdr.121119-1606
Machine Name:
Kernel base = 0xfffff800`62473000 PsLoadedModuleList = 0xfffff800`6273da80
Debug session time: Wed Jul 2 13:01:36.560 2014 (UTC - 4:00)
System Uptime: 0 days 0:06:06.204
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000158, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800200c1e3, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800627c9168
GetUlongFromAddress: unable to read from fffff800627c91f8
0000000000000158 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+206ab
fffff880`0200c1e3 f0ff8058010000 lock inc dword ptr [rax+158h]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff8800eb00130 -- (.trap 0xfffff8800eb00130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80163854a0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800200c1e3 rsp=fffff8800eb002c0 rbp=fffff8800eb00410
r8=fffff8800eb00468 r9=fffff8800eb00558 r10=fffffa800dd62bc0
r11=0000000000000012 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x206ab:
fffff880`0200c1e3 f0ff8058010000 lock inc dword ptr [rax+158h] ds:00000000`00000158=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800624ed669 to fffff800624ee340
STACK_TEXT:
fffff880`0eafffe8 fffff800`624ed669 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0eaffff0 fffff800`624ebee0 : 00000000`00000001 fffffa80`163854a0 ffffe6cf`579b1800 fffff880`0eb00130 : nt!KiBugCheckDispatch+0x69
fffff880`0eb00130 fffff880`0200c1e3 : fffff880`0eb00410 fffffa80`0dd611b0 00000000`00000001 fffffa80`163854a0 : nt!KiPageFault+0x260
fffff880`0eb002c0 fffff880`01f1b43e : fffff880`0eb00880 fffffa80`0e700002 00000000`0000abc7 fffff880`06d9acc7 : tcpip! ?? ::FNODOBFM::`string'+0x206ab
fffff880`0eb004e0 fffff880`01f6258e : 00000000`00000000 fffffa80`15a162b0 fffffa80`15a162b0 fffffa80`0ddb3b0c : tcpip!WfpInspectSendNonTcpDatagram+0x15e
fffff880`0eb005f0 fffff880`01f5faca : 00000000`0000000e fffff880`00001882 fffff880`0eb00890 00000000`00000000 : tcpip!IppInspectLocalDatagramsOut+0x4de
fffff880`0eb007a0 fffff880`01f1a1af : 00000000`00000004 fffff880`02063b90 fffffa80`15a162b0 00000000`00000000 : tcpip!IppSendDatagramsCommon+0x3da
fffff880`0eb00960 fffff880`01f192e9 : fffffa80`148cd340 fffffa80`0e6ea2e4 fffff880`0eb01430 fffff880`02063b90 : tcpip!UdpSendMessagesOnPathCreation+0x90f
fffff880`0eb00d80 fffff880`01f1b564 : fffff880`019b7180 fffff800`62473000 fffff880`0eb01330 00000000`16038800 : tcpip!UdpSendMessages+0x259
fffff880`0eb01190 fffff800`6252efd5 : 00000000`00000000 00000000`00000000 00000000`00000005 fffff880`0eafc000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0eb011c0 fffff800`6252fde5 : fffff880`01f1b550 fffff880`0eb01330 00000000`00000000 fffff880`01c0b9fa : nt!KeExpandKernelStackAndCalloutInternal+0xe5
fffff880`0eb012c0 fffff880`01f1b750 : fffffa80`168dfe40 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`0eb01300 fffff880`05a52bfa : fffffa80`15831bb0 fffff880`0eb01b80 fffffa80`0e6ea280 0000000c`001f0000 : tcpip!UdpTlProviderSendMessages+0x70
fffff880`0eb01380 fffff880`05a3acd2 : fffffa80`15831bb0 fffff880`0eb01620 fffffa80`0000001e 00000000`00000000 : afd!AfdFastDatagramSend+0x51a
fffff880`0eb014e0 fffff800`628d1fca : fffffa80`1602bec0 fffffa80`1602be70 00000000`00000000 00000000`00000288 : afd!AfdFastIoDeviceControl+0xcc2
fffff880`0eb01890 fffff800`628d2d56 : 00000000`00000344 00000000`00000348 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x3d9
fffff880`0eb01a20 fffff800`624ed353 : fffffa80`16038700 fffff880`0eb01b80 fffffa80`15f80690 fffff800`628baf4d : nt!NtDeviceIoControlFile+0x56
fffff880`0eb01a90 00000000`77ca2ad2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03d1f128 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ca2ad2
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip! ?? ::FNODOBFM::`string'+206ab
fffff880`0200c1e3 f0ff8058010000 lock inc dword ptr [rax+158h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip! ?? ::FNODOBFM::`string'+206ab
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 505ab2ec
FAILURE_BUCKET_ID: X64_AV_tcpip!_??_::FNODOBFM::_string_+206ab
BUCKET_ID: X64_AV_tcpip!_??_::FNODOBFM::_string_+206ab
Followup: MachineOwner