Hi.
So I have been trying to solve error alone, but seems I can't, so I would need someone who can read WinDBG report well.

https://drive.google.com/file/d/1PmejRa8t1S1dc3u3wh4vds7VbH-zGScb/

WinDBG report full here:

Code:
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Temp*http://msdl.microsoft.com/download/symbols


Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.




Loading Dump File [C:\Users\Muamer\Downloads\Podaci\123019-10218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available




************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Temp*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Temp*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 10 Kernel Version 18362 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff801`19400000 PsLoadedModuleList = 0xfffff801`19848130
Debug session time: Mon Dec 30 04:19:35.770 2019 (UTC + 1:00)
System Uptime: 0 days 0:37:59.543
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80119a8e922, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception


Debugging Details:
------------------


*** WARNING: Unable to verify timestamp for win32k.sys


KEY_VALUES_STRING: 1




PROCESSES_ANALYSIS: 1


SERVICE_ANALYSIS: 1


STACKHASH_ANALYSIS: 1


TIMELINE_ANALYSIS: 1




DUMP_CLASS: 1


DUMP_QUALIFIER: 400


BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202


SYSTEM_PRODUCT_NAME:  To Be Filled By O.E.M.


SYSTEM_SKU:  To Be Filled By O.E.M.


SYSTEM_VERSION:  To Be Filled By O.E.M.


BIOS_VENDOR:  American Megatrends Inc.


BIOS_VERSION:  P4.20


BIOS_DATE:  05/14/2019


BASEBOARD_MANUFACTURER:  ASRock


BASEBOARD_PRODUCT:  H310CM-DVS


BASEBOARD_VERSION:                        


DUMP_TYPE:  2


BUGCHECK_P1: ffffffffc0000005


BUGCHECK_P2: fffff80119a8e922


BUGCHECK_P3: 0


BUGCHECK_P4: ffffffffffffffff


READ_ADDRESS: fffff801199733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff 


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.


FAULTING_IP: 
nt!HvpGetCellPaged+a2
fffff801`19a8e922 418b02          mov     eax,dword ptr [r10]


EXCEPTION_PARAMETER2:  ffffffffffffffff


BUGCHECK_STR:  0x1E_c0000005_R


CPU_COUNT: 6


CPU_MHZ: b58


CPU_VENDOR:  GenuineIntel


CPU_FAMILY: 6


CPU_MODEL: 9e


CPU_STEPPING: a


CPU_MICROCODE: 6,9e,a,0 (F,M,S,R)  SIG: B4'00000000 (cache) B4'00000000 (init)


BLACKBOXBSD: 1 (!blackboxbsd)




BLACKBOXNTFS: 1 (!blackboxntfs)




BLACKBOXPNP: 1 (!blackboxpnp)




BLACKBOXWINLOGON: 1


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


PROCESS_NAME:  Registry


CURRENT_IRQL:  0


ANALYSIS_SESSION_HOST:  DESKTOP-JOAKFQR


ANALYSIS_SESSION_TIME:  12-30-2019 19:34:06.0604


ANALYSIS_VERSION: 10.0.18362.1 amd64fre


EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: fffff801195c14e0 (nt!KeBugCheckEx)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000001
NumberParameters: 0


TRAP_FRAME:  ffff9180c6316000 -- (.trap 0xffff9180c6316000)
Unable to read trap frame at ffff9180`c6316000


LAST_CONTROL_TRANSFER:  from fffff8011962fda7 to fffff801195c14e0


STACK_TEXT:  
fffffb02`c8ef81c8 fffff801`1962fda7 : 00000000`0000001e ffffffff`c0000005 fffff801`19a8e922 00000000`00000000 : nt!KeBugCheckEx
fffffb02`c8ef81d0 fffff801`195d341d : ffffffff`ffffffff fffffb02`c8ef8980 ffff9180`c6316000 fffffb02`c8ef89ac : nt!KiDispatchException+0x1689d7
fffffb02`c8ef8880 fffff801`195cf1a2 : 00000000`00000000 00000000`41735370 ffff9180`95800100 fffff801`19445ed7 : nt!KiExceptionDispatch+0x11d
fffffb02`c8ef8a60 fffff801`19a8e922 : fffff801`19a2979f 00000000`341a8244 fffffb02`c8ef8f40 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
fffffb02`c8ef8bf8 fffff801`19a2979f : 00000000`341a8244 fffffb02`c8ef8f40 00000000`00000000 ffff9180`bbc0e3d0 : nt!HvpGetCellPaged+0xa2
fffffb02`c8ef8c00 fffff801`19a28099 : 00000001`ffffffff 00000000`e3616e02 fffffb02`c8ef96f8 ffff9180`00000000 : nt!CmpDoCompareKeyName+0x2f
fffffb02`c8ef8c50 fffff801`199f226a : ffff9180`bbc0e3d0 00000000`00000002 fffffb02`c8ef8e48 fffffb02`c8ef8ed0 : nt!CmpWalkOneLevel+0x709
fffffb02`c8ef8d60 fffff801`199ef2d4 : ffffe10b`0000001c fffffb02`c8ef90b0 fffffb02`c8ef9078 00000000`00000000 : nt!CmpDoParseKey+0x9fa
fffffb02`c8ef9000 fffff801`199ed1bf : ffffe10b`d8dd6010 ffff9180`95eff501 00000000`00000000 ffffe10b`cccf3800 : nt!CmpParseKey+0x274
fffffb02`c8ef9220 fffff801`199eb621 : ffffe10b`d8dd6000 fffffb02`c8ef9468 fffff801`00000240 ffffe10b`cccf3820 : nt!ObpLookupObjectName+0x78f
fffffb02`c8ef93e0 fffff801`199f4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffe10b`cccf3820 : nt!ObOpenObjectByNameEx+0x201
fffffb02`c8ef9520 fffff801`199f49bd : fffffb02`c8ef99f0 fffffb02`c8ef9890 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x5c
fffffb02`c8ef9570 fffff801`199f69df : 00000000`00000000 00000000`00000000 ffff9180`c008b120 00000000`02000000 : nt!CmOpenKey+0x29d
fffffb02`c8ef97d0 fffff801`195d324e : 00000000`00000800 00000000`00000000 00000000`00000000 00000000`00000003 : nt!NtOpenKeyEx+0xf
fffffb02`c8ef9810 fffff801`195c5320 : fffff801`199c62a8 ffff9180`c6319c60 fffff801`199c3396 00000000`00000086 : nt!KiSystemServiceExitPico+0x2b9
fffffb02`c8ef99a8 fffff801`199c62a8 : ffff9180`c6319c60 fffff801`199c3396 00000000`00000086 fffffb02`c8ef9b01 : nt!KiServiceLinkage
fffffb02`c8ef99b0 fffff801`199c61d2 : 00000000`00000000 ffffffff`800000c8 ffff9180`c6319c60 00000000`00000000 : nt!_RegRtlOpenKeyTransacted+0xc0
fffffb02`c8ef9a50 fffff801`19aa8dc8 : fffffb02`c8ef9b40 fffff801`199c631e 00000000`00000182 ffff9180`c6319c60 : nt!SysCtxRegOpenKey+0x3a
fffffb02`c8ef9a90 fffff801`19aa8c7d : 00000000`00000182 fffffb02`c8ef9b40 00000000`00000000 00000000`00000000 : nt!PnpCtxRegOpenKey+0x2c
fffffb02`c8ef9ad0 fffff801`19aa8aa2 : ffff9180`95e07120 ffff9180`95ff1de0 00000000`000000db ffff9180`c008b120 : nt!_CmOpenDeviceInterfaceRegKeyWorker+0x199
fffffb02`c8ef9b80 fffff801`19aa76e2 : fffff801`00000000 fffffb02`c8ef9cd0 ffff9180`c74225e0 fffffb02`c8ef9e68 : nt!_CmOpenDeviceInterfaceRegKey+0xd6
fffffb02`c8ef9c70 fffff801`199bd69b : ffff9180`c008b110 00000000`00000000 fffffb02`c8ef9d00 fffff801`19402908 : nt!_PnpDispatchDeviceInterface+0xf2
fffffb02`c8ef9ce0 fffff801`199bd5c2 : 00000000`02000000 fffffb02`c8ef9dd9 ffff9180`95e07120 00000000`00000000 : nt!_PnpOpenObjectRegKeyDispatch+0xa7
fffffb02`c8ef9d70 fffff801`199c0942 : 00000000`00000000 00000000`00000003 ffff9180`c008b120 00000000`00000003 : nt!_PnpOpenObjectRegKey+0xc2
fffffb02`c8ef9e20 fffff801`199bfb15 : fffffb02`c8ef9f90 ffff9180`95ff1de0 00000000`00000003 00000000`00000003 : nt!PiPnpRtlCacheObjectBaseKey+0xf2
fffffb02`c8ef9e90 fffff801`199bda45 : 00000000`00000000 fffffb02`c8ef9fd1 ffff9180`95e07120 00000000`00000042 : nt!PiPnpRtlObjectActionCallback+0x125
fffffb02`c8ef9f30 fffff801`199bd7ee : 00000000`00000000 ffff9180`bbdf0640 ffff9180`ba8ddb30 ffff9180`00000000 : nt!_PnpGetObjectProperty+0x9d
fffffb02`c8efa000 fffff801`199bca10 : ffff9180`95ff1de0 fffffb02`c8efa250 ffffe10b`ccc02000 00000000`00000000 : nt!PiDqPnPGetObjectProperty+0x116
fffffb02`c8efa0b0 fffff801`199b8f08 : 00000000`00000000 fffffb02`c8efa1a0 00000000`00000007 fffff801`19770140 : nt!PiDqPropertyCallback+0x140
fffffb02`c8efa130 fffff801`199bc582 : fffff801`199bc8d0 fffffb02`c8efa250 00000000`00000000 00000000`00000000 : nt!FilterEvalStrict+0xf8
fffffb02`c8efa1e0 fffff801`199bc6f3 : ffff9180`c74225e0 00000000`00000000 fffffb02`c8efa280 ffff9180`bbdf0640 : nt!FilterEval+0x22
fffffb02`c8efa220 fffff801`199bc81e : 00000000`00000000 00000000`00000000 ffff9180`c74225e0 ffff9180`95ff5610 : nt!PiDqQueryEvaluateFilter+0xbb
fffffb02`c8efa2b0 fffff801`199bc776 : fffff801`19861800 ffff9180`95ff5610 fffff801`198618e0 fffff801`198618e0 : nt!PiDqQueryEnumObject+0x9a
fffffb02`c8efa2f0 fffff801`199be811 : ffff9180`95ff5610 00000000`00000000 ffff9180`95ff5610 fffff801`198618e0 : nt!PiDqEnumQueryObjectsCallback+0x16
fffffb02`c8efa320 fffff801`199b7b2c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`c0000001 : nt!PiDmEnumObjectsWithCallback+0x10d
fffffb02`c8efa440 fffff801`199b8426 : 00000000`00000000 ffffe10b`00000000 00000000`00000016 00000000`00000000 : nt!PiDqObjectManagerEnumerateAndRegisterQuery+0x338
fffffb02`c8efa580 fffff801`199b7082 : ffffe10b`de910d10 00000000`00000000 00000000`00000000 fffffb02`c8efa6c0 : nt!PiDqQuerySerializeActionQueue+0x9e
fffffb02`c8efa610 fffff801`199b7cde : ffffe10b`deb441a0 ffffe10b`d9ae9001 00000000`00000000 fffff801`1943f110 : nt!PiDqIrpQueryGetResult+0x14e
fffffb02`c8efa6b0 fffff801`19aca546 : ffffe10b`deb441a0 ffffe10b`ccd0cd80 fffff801`19774b90 00000000`00000002 : nt!PiDqDispatch+0x17e
fffffb02`c8efa6f0 fffff801`19431f79 : ffffe10b`deb441a0 00000000`00000002 00000000`00000000 00000000`00000000 : nt!PiDaDispatch+0x46
fffffb02`c8efa720 fffff801`199e95e5 : ffffe10b`deb441a0 00000000`00000000 ffffe10b`deb441a0 00000000`00000000 : nt!IofCallDriver+0x59
fffffb02`c8efa760 fffff801`199e93f0 : 00000000`00000000 00000000`00000000 ffffe10b`ddb3fd60 fffffb02`c8efaa80 : nt!IopSynchronousServiceTail+0x1a5
fffffb02`c8efa800 fffff801`199e87c6 : 00000000`000045a4 00000000`00000000 00000000`00000000 00000000`2f928da8 : nt!IopXxxControlFile+0xc10
fffffb02`c8efa920 fffff801`195d324e : 00000000`2f928da8 00000000`00000000 00000000`00000000 00000000`000045a4 : nt!NtDeviceIoControlFile+0x56
fffffb02`c8efa990 00007ffa`b1fbc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
00000000`2cc8f128 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`b1fbc1a4




THREAD_SHA1_HASH_MOD_FUNC:  ee2c6c3610db077f723e27fd9d474eb83586ed72


THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58dadc621b798f7a0e3c6f2c00015582588f4e46


THREAD_SHA1_HASH_MOD:  7d90cf110e56f07e8252967615552e0185368c28


FOLLOWUP_IP: 
nt!HvpGetCellPaged+a2
fffff801`19a8e922 418b02          mov     eax,dword ptr [r10]


FAULT_INSTR_CODE:  41028b41


SYMBOL_STACK_INDEX:  4


SYMBOL_NAME:  nt!HvpGetCellPaged+a2


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: nt


IMAGE_NAME:  ntkrnlmp.exe


DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470


IMAGE_VERSION:  10.0.18362.535


STACK_COMMAND:  .thread ; .cxr ; kb


BUCKET_ID_FUNC_OFFSET:  a2


FAILURE_BUCKET_ID:  0x1E_c0000005_R_nt!HvpGetCellPaged


BUCKET_ID:  0x1E_c0000005_R_nt!HvpGetCellPaged


PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_nt!HvpGetCellPaged


TARGET_TIME:  2019-12-30T03:19:35.000Z


OSBUILD:  18362


OSSERVICEPACK:  535


SERVICEPACK_NUMBER: 0


OS_REVISION: 0


SUITE_MASK:  272


PRODUCT_TYPE:  1


OSPLATFORM_TYPE:  x64


OSNAME:  Windows 10


OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS


OS_LOCALE:  


USER_LCID:  0


OSBUILD_TIMESTAMP:  1980-01-11 16:53:20


BUILDDATESTAMP_STR:  190318-1202


BUILDLAB_STR:  19h1_release


BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202


ANALYSIS_SESSION_ELAPSED_TIME:  feba


ANALYSIS_SOURCE:  KM


FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_nt!hvpgetcellpaged


FAILURE_ID_HASH:  {f86e9d75-9ce4-8799-af45-48af90ca5aaf}


Followup:     MachineOwner
---------


0: kd> .bugcheck
Bugcheck code 0000001E
Arguments ffffffff`c0000005 fffff801`19a8e922 00000000`00000000 ffffffff`ffffffff


Problem Explanation:

Day before error I downloaded and installed windows 10 1909 Update.
Note that pc left needing restart to finish this update.

Next day I did had few tabs openned and played videos, and one of them i tried switching to full screen and changing time of the video, than I get black out for few seconds, it was caused by two amd driver crashes.
It was novembar release 19.11.1 i think.

Yesterday i restarted and updated windows 10 1909, used ddu and installed 19.12.3 driver.

Than bsod occured once and amd driver crash every time in scenario explained above.
Im device manager Samsung TV was discovered as media device, and only main display was shown with full name under monitors (my Asus monitor).

Than after i wrote post before this, for some unknown reason to me, Windows 10 1909 decide to remove name of Asus under monitors in device manager, and showed it as generic pnp monitor, than suddenly in short time another generic pnp monitor showed in same place.

And now no above error, nor AMD crash.

Possibility is, as you said first crash occured by many tabs and many videos, or it could also be hanging windows update that needed restart.

And second one was because windows did not wanted to add tv as monitor in its registry or something like that, but suddenly it get smart by itself, and i remember it asking also once to restart to install some bus device, but the problem persisted after restart in time it asked the thing about bus needs restart to install.

However, right now no problem, just my both monitors are show as generic pnp monitors instead names in device manager, while in settings names are shown and also in amd settings i can see names.

This is mistery because i remember clicking scan for hardware changes in device manager, but windows still did not seen tv as monitor and rather as media device, until it sorted it out suddenly all alone.

So, ok, maybe we can blame windows for second time, under second circumstances, but what about first one with many tabs of videos?


The main question is: What is BSOD about, hardware or software, is it caused by AMD, how do I know?