Can you run Speccy and post the updated url for us pleased.
Three things of note in your crash dmp, Chrome, MBAM and WOW, due to the high level of internet use at the time I strongly suspect that it was MBAM that caused the crash and namely mwac.sys which failed to load, the mwac.sys driver is concerned with MBAMWebProtection see info
here
Debug session time: Fri Dec 14 16:09:34.821 2018 (UTC - 5:00)
System Uptime: 0 days 15:38:31.581
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe584967a76c0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8008fd006fd, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 000000000000000c, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffe584967a76c0
FAULTING_IP:
nt!NtQueryDirectoryObject+13d
fffff800`8fd006fd 488b1b mov rbx,qword ptr [rbx]
MM_INTERNAL_CODE: c
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
TRAP_FRAME: ffffed827e967720 -- (.trap 0xffffed827e967720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000ba rbx=0000000000000000 rcx=0000000000000018
rdx=fffff8008f81b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8008fd006fd rsp=ffffed827e9678b0 rbp=ffffed827e967a80
r8=ffffed827e967888 r9=0000000000000000 r10=7fffffffffffff00
r11=ffffd484a2b3bb00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!NtQueryDirectoryObject+0x13d:
fffff800`8fd006fd 488b1b mov rbx,qword ptr [rbx] ds:00000000`00000000=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8008f87d659 to fffff8008f9c50a0
STACK_TEXT:
ffffed82`7e967468 fffff800`8f87d659 : 00000000`00000050 ffffe584`967a76c0 00000000`00000000 ffffed82`7e967720 : nt!KeBugCheckEx
ffffed82`7e967470 fffff800`8f875228 : 00000000`c0000016 00000000`00000000 ffff8000`00000000 ffff8040`20100800 : nt!MiSystemFault+0xcf9
ffffed82`7e9675b0 fffff800`8f9d27da : 00000000`00000000 00000000`000000ef ffffd484`96426870 00000000`00000020 : nt!MmAccessFault+0x1f8
ffffed82`7e967720 fffff800`8fd006fd : 00000000`00000000 00000000`00004000 00000000`6d4e624f 00000000`00000000 : nt!KiPageFault+0x31a
ffffed82`7e9678b0 fffff800`8f9d5743 : 00000000`00000000 000000eb`ecf8b920 000000eb`00004000 ffffed82`7e967a00 : nt!NtQueryDirectoryObject+0x13d
ffffed82`7e967990 0000024c`9b39c4f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000eb`ecf8b038 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x24c`9b39c4f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!NtQueryDirectoryObject+13d
fffff800`8fd006fd 488b1b mov rbx,qword ptr [rbx]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!NtQueryDirectoryObject+13d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5c0b7468
FAILURE_BUCKET_ID: X64_AV_nt!NtQueryDirectoryObject+13d
BUCKET_ID: X64_AV_nt!NtQueryDirectoryObject+13d
Followup: MachineOwner
---------