Didn't solve the problem, I've copied the minidump file below "I think":
Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\041519-6468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff805
02e19000 PsLoadedModuleList = 0xfffff805
03234790
Debug session time: Mon Apr 15 16:18:12.661 2019 (UTC - 7:00)
System Uptime: 0 days 6:01:08.316
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
02fcc730 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdd03
ffac3480=000000000000000a
12: kd> !analyze -v
***
***
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000001a, value 0 = read operation, 1 = write operation
Arg4: fffff8035b4a35d1, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P1.60
BIOS_DATE: 11/09/2018
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X470 Taichi
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: ff
BUGCHECK_P3: 1a
BUGCHECK_P4: fffff8035b4a35d1
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff805032e0540
fffff8050335b390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 0
FAULTING_IP:
amdppm!ReadGenAddr+49
fffff803
5b4a35d1 488bc2 mov rax,rdx
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CPU_COUNT: 10
CPU_MHZ: e74
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-RNEEC1T
ANALYSIS_SESSION_TIME: 04-15-2019 22:27:56.0740
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffffdd03ffac35c0 -- (.trap 0xffffdd03ffac35c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035b4a35d1 rsp=ffffdd03ffac3750 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffa70da5046f48
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
amdppm!ReadGenAddr+0x49:
fffff803
5b4a35d1 488bc2 mov rax,rdx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80502fdde69 to fffff80502fcc730
STACK_TEXT:
ffffdd03
ffac3478 fffff805
02fdde69 : 00000000
0000000a 00000000
00000000 00000000
000000ff 00000000
0000001a : nt!KeBugCheckEx
ffffdd03
ffac3480 fffff805
02fda28e : ffffffff
feced300 00000000
00000000 00000000
00000000 00000000
0000000a : nt!KiBugCheckDispatch+0x69
ffffdd03
ffac35c0 fffff803
5b4a35d1 : ffff7f89
09569779 ffffdd03
ffac3778 00000000
0000670d 00000000
000041b5 : nt!KiPageFault+0x44e
ffffdd03
ffac3750 fffff803
5b4a4615 : 00000000
00000000 00000000
00000000 ffffa70d
9f7faf20 fffff805
030ecbbb : amdppm!ReadGenAddr+0x49
ffffdd03
ffac3780 fffff803
5b4a44d4 : ffffe100
61e8f180 ffffa70d
a4352010 ffffe100
61e8f180 ffffa70d
a4352010 : amdppm!C2Idle+0x85
ffffdd03
ffac37b0 fffff805
02effbbb : 00000000
00000000 00000000
00000001 00000000
00000000 00000000
00000024 : amdppm!AcpiCStateIdleExecute+0x24
ffffdd03
ffac37e0 fffff805
02eff36f : 00000000
00000000 00000000
00000002 00000000
00000000 00000000
00000008 : nt!PpmIdleExecuteTransition+0x6bb
ffffdd03
ffac3b00 fffff805
02fd011c : ffffffff
00000000 ffffe100
61e8f180 ffffe100
61e9f400 ffffa70d
a9404080 : nt!PoIdle+0x33f
ffffdd03
ffac3c60 00000000
00000000 : ffffdd03
ffac4000 ffffdd03
ffabe000 00000000
00000000 00000000
00000000 : nt!KiIdleLoop+0x2c
THREAD_SHA1_HASH_MOD_FUNC: fc20f6700dbad761158bab1cb90b6142d379d241
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 88e072fc5c2e86142230263ce8199d8a7810b8b1
THREAD_SHA1_HASH_MOD: eeabd32674d15bac10d9e1443c453f53e952d7a0
FOLLOWUP_IP:
amdppm!ReadGenAddr+49
fffff803`5b4a35d1 488bc2 mov rax,rdx
FAULT_INSTR_CODE: 48c28b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: amdppm!ReadGenAddr+49
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 6bcef4d6
IMAGE_VERSION: 10.0.17763.379
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 49
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!ReadGenAddr
BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!ReadGenAddr
PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!ReadGenAddr
TARGET_TIME: 2019-04-15T23:18:12.000Z
OSBUILD: 17763
OSSERVICEPACK: 437
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-12-01 23:58:59
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 3687
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_amdppm!readgenaddr
FAILURE_ID_HASH: {d069edc7-ccfd-af02-f204-ddf57e0d26c5}
Followup: MachineOwner
---------